Crowdsourced - Work From Home Security Guide (In plain english...)
Crowdsourced - Work From Home Security Guide

Crowdsourced - Work From Home Security Guide (In plain english...)

Like many others, you may have been caught off guard by the Coronavirus and your entire team is now required to work from home. I posted the following question on LinkedIn,

``What can companies do to address the risk of people using their personal computers and home networks to access sensitive data?”

Many of you responded and your suggestions were a treasure trove! This quick guide is based on your responses.

Here is the link to the original post https://www.linkedin.com/posts/gabrielfriedlander_cybersecurity-informationsecurity-securityawareness-activity-6643852011282456577-279J

Security Mindset

Before we begin, there are a few common beliefs that have to do more with mindset than technology.

Get up, it’s time to go to work

You are at home but you are actually at work, so don’t work from bed… find a place and make it your office. Let your family know that this is your office and it’s not to be shared with others while you are working. And remember, Starbucks is not your home… home is where you wake up every morning and not a public place. Make sure confidential information is not laying around and lock your computer when you are not next to it. Don’t email documents to your home printer or to your personal email just to make it easy to print.

Smile, you are on camera

Communication and collaboration is another big topic and technology will play a major role. You will probably need to over communicate using tools like Teams, Slack, or Zoom (so get out of your PJs…) and don’t use WhatsApp, Facebook, LinkedIn, or any other personal or social app to communicate. Only use the tools approved by your organization and apply even stricter security measures than for email (for example, don’t share passwords on Slack).

Polices, Procedures, and Awareness

Before we talk about technology, it’s important employees understand what is expected from them. Work with your HR/Training department on putting together a mini orientation on remote work.

Update your security policies 

Time to refresh your BYOD and Remote Work policies. If you don’t have anything… create a list of the most critical security Policies/Rules and share it with all remote users. This is a great reason to revise your existing security policies and train your team.

Security awareness starts at home

Your manager is not sitting next to you anymore, so it‘s important now more than ever to refresh your security awareness training and reinforce some of the basic security rules, such as call over the phone and verify any request to share confidential data or transfer funds. In addition to standard training, also provide home security awareness, e.g. don't have work sensitive conversations near IOT devices like Siri, Alexa, or Google Home in case they're listening. Devices are not to be shared with other family members and they must have a unique password and a lock screen timeout. There are some great paid and free security awareness solution that include both business and home user training such as https://wizer-training.com (this is our solution...)

Now Let’s Talk Technology

Because this is a quick guide, I focused on the “quick wins” that organizations can achieve in a short amount of time with an affordable budget. Obviously there is much more that can be done depending on the budget and maturity of the organization (Monitoring, Logging, Network Segregation, Identity Management etc...), but I think this is a good starting point.

Provide an isolated environment to work from

Since you’re most likely unable to control remote worker devices, you’ll want to isolate work related activities from the home network as much as possible. If available, provide employees with company laptops that are hardened (VPN, endpoint security, patched and the items listed below). These devices should be used strictly for organizational work only. If this is cost prohibitive or too time consuming, then provide them with pre-configured Virtual Desktops. You can either have these virtual desktops run on their personal computers (assuming their hardware supports it…) or consider azure-based virtual desktops users can remotely connect to. In any case, avoid a solution where employees share a computer for both work and personal usage, and only use the Admin account when authorized and not for routine work.

Support Hotline - Non-technical people should not perform technical tasks; this could lead to even greater risk. So set up a hotline and make sure users know who to contact in the event of technical issues. Maybe it’s time to upgrade the ticketing system…

VPN - Set up a company VPN and require it to access the office network and resources. And make sure the firewall and infrastructure can handle all the "new" inbound traffic.

MFA - Many times MFA is enabled but not enforced, so make sure it is enforced for all users and apps. If hardware tokens are too expensive, use an Authentication App on a smartphone rather than 2FA (Text messages). 

WiFi - Wifi must have WPA-2 security and don't publish your SSID / Wifi Name. Never use shared/public Wifi, and if possible avoid using Wifi all together and use a wired network. Also create a guest network to separate your work computer from all other devices. Some routers have this functionality built-in or purchase an additional router just for work.

Complex Passwords - Do not under any circumstances save your passwords to your browser. Use long and complex pass-phases and don’t reuse them. Use a unique password for your Wifi, Apps, Router, etc...

Safe Browser - It’s advised to use a secure browser like Brave Browser, which is also faster.

Keep your device updated - Apply the latest security patches (OS and Apps) and avoid outdated Operating Systems like Windows 7 or XP across both Virtual Desktops and Personal computers. Keep only apps that were approved by the organization (uninstall all others) and turn on Automatic updates.

Endpoint protection - Use a NextGen anti-virus solution on all remote devices.

Firewall - Make sure the built-in firewall is properly configured and always enabled on remote devices.

Backup - Direct users how and where to backup their data, don’t rely on them to come up with a solution. Preferably an encrypted offline back up.

Encryption - Encrypt files stored on devices. Many options exist for protecting files including encrypting individual files or folders, volumes, and hard drives, and avoid using removable devices such as USB sticks.

Additional useful resources…

From National Institute of Standards and Technology (NIST): User's Guide to Telework and Bring Your Own Device (BYOD) Security

https://www.nist.gov/publications/users-guide-telework-and-bring-your-own-device-byod-security

From Center for Internet Security: CIS Controls Telework and Small Office Network Security Guide

https://www.cisecurity.org/white-papers/cis-controls-telework-and-small-office-network-security-guide/

On a personal note, I believe this huge increase in working from home situation will change the world as we know it. Organizations will realize working from home is not such a bad idea and could overall reduce operational costs. It will create an opportunity to hire skilled employees regardless of location and provide a better life/work balance. I think companies need to quickly adapt and use this as a catalyst to develop a secure environment for this new work from home culture.

This version #1 is a live document and I would love to get your feedback. Following this feedback, I will create a version #2 and compile it as a PDF.

Terri Paterson

We help companies become Cyber Secure & Cyber Certified. Application Testing | Vulnerability Assessment | Penetration Testing | Red Teaming

4y

What great work Gabriel Friedlander this is what its about people sharing, being listened to and then someone like you actually taking action on it. So thank you for this!

Like
Reply
Marcel Wildenberg CISSP

Technical Information Security Officer / Security Awareness Consultant

4y

Great job, Gabi. Thanks for sharing.

Like
Reply
Andy Wilcox

A Fractional Sales Leader - (Sales-as -a-service ) Helping businesses and their employees reach their full potential by maximising their sales performance.

4y

Thanks for sharing Reena

Like
Reply
Doug Meier

National Director, Information Security & Data Governance

4y

Great work Gabriel pulling this together.

Like
Reply
Kevin H.

410-846-4582 | CISM / CISSP Candidate | Author #Hacked2 | Information System Security Manager (ISSM) | Security + | Network + |

4y
Like
Reply

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics