Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Simple Security Steps for Employees and Employers – Establishing Secure and Flexible Remote Work Environments

By Carmen Fontana
coronavirus
March 25, 2020

As companies find themselves suddenly shifting to remote work due to the COVID-19 (coronavirus) outbreak, many employees are working from home for the first time. While not ideal from a security standpoint, there are simple steps you, and your employer, can quickly take to better secure your new working environment.

One of the easiest things you can do to better secure your home network is to ensure that your Wi-Fi and router passwords are strong. Specifically, ensure that you’re utilizing WPA2 or the most recently available security protocol on your Wi-Fi router. Also, consider using separate network access for your guest/family/IoT devices than your work Wi-Fi. If you want to go even further, think about implementing firewall rules and/or a DNS server.

If you must work outside of your home, first and foremost, practice social distancing! From a more technical perspective, use a secure VPN to add a layer of protection between your laptop and the public network you are accessing. Another option is to use your cell phone’s hotspot to facilitate your Wi-Fi connection.

Unfortunately, nefarious actors capitalize on situations like this to prey on our anxieties, insecurities and fears. Your company’s IT support team should never unexpectedly email you to ask for account information, home networking information, etc. Exercise excessive caution if someone contacts you in this manner. To see if the request is legitimate, do not call or email any numbers or addresses contained in the email. These may be false contacts designed to lure you further into their deception. Instead, call the number visibly published on your company’s intranet to contact the IT support department.  

Working remotely can be isolating in normal times, but even more so now as we practice social distancing outside of work. Cybercriminals may try to capitalize on our loneliness by ramping up their social engineering efforts. It is perfectly fine (and encouraged!) to replicate in-person interactions on Facebook, LinkedIn, Twitter, etc. However, be extra vigilant. Specifically, be wary of anyone who comes across too chummy or who asks a lot of questions about your work. Cybercriminals may even try to impersonate people you know to bait you into disclosing confidential data. Err on the side of caution and be sure to use the phone to verify the validity of requests before sharing sensitive information.

There are also several actions your employer can take right now to provide a flexible – and secure – home working environment.

Chances are that your company already has VPN access in place. However, the sudden shift to remote work is straining these systems originally intended for much smaller loads. To rapidly offload some of the traffic from strained corporate data centers, companies can shift onsite files to the cloud. A rapid file migration to a public cloud provider can be implemented in days rather than weeks.

Another way to maintain security while decreasing VPN load is to move high-volume workloads to the cloud. One example – shifting software development Continuous Integration (CI) pipeline to the cloud to help efficiently manage, test, and deploy applications. Keeping the CI pipeline in the cloud provides several advantages over on-prem solutions, such as enabling secure universal access, scalability, reliability and flexibility.

Data Analysis/Reporting capabilities are another cloud migration candidate, as they create high-volume traffic on a VPN. Companies can effectively offset this load by creating a data lake in a public cloud provider. Data lakes are simply a repository of raw data – creating one can be as simple as restoring a database backup in the cloud environment. Cloud-based visualization and analytics tools can work with data in the cloud without affecting VPN.

Many companies leverage cloud-based collaboration tools. To increase remote worker VPN speed, enterprises should consider implementing split-tunneling, which reduces VPN load by permitting natively encrypted traffic to bypass VPN. There are pros and cons to this approach, so a thoughtful examination is essential before implementation.

Finally, companies may want to consider a virtual desktop implementation. Sometimes called “Desktop as a (DaaS),” Virtual Desktop tools replicate the desktop experience from a web browser. By removing device dependencies, organizations enable increased security, scalability, and cost savings. Virtual desktop implementations can be rolled out quickly, effectively expediting the typically lengthy hardware procurement and implementation process.

Maintaining security in a remote environment requires commitments from both employers and their employees. However, there are simple steps that both groups can take now to effectively establish a safe and flexible work environment.

KEYWORDS: cloud-based access control coronavirus cyber security cybersecurity remote workers

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Carmen fontana

Carmen Fontana, IEEE Member and Modern Software Delivery Service Offering Lead with Centric Consulting, specializes in cloud-based and emerging technologies. In her role at Centric Consulting, a consulting company focusing on working with enterprises to enable digital transformations for improved business processes, Fontana is responsible for helping identify and cultivate new ways of solving clients’ problems with a major emphasis placed on strategic service offerings.  Fontana is heavily involved in Centric Consulting’s Innovation program due to her expertise in emerging technologies, such as IoT, AI, and quantum computing.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • email

    Six Steps to Boost Email Security for Remote Employees

    See More
  • SEC1118-talk-Feat-slide1_900px

    The Top 10 Employer Cybersecurity Concerns For Employees Regarding Remote Work

    See More
  • remote work

    Facebook Announces Permanent Remote Work Option for Employees

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing