flevyblog

Flevy Blog is an online business magazine covering Business Strategies, Business Theories, & Business Stories.
MANAGEMENT & LEADERSHIP STRATEGY, MARKETING, SALES OPERATIONS & SUPPLY CHAIN ORGANIZATION & CHANGE IT/MIS Other

5 Important Best Practices for Keeping Data Secure When Employees Are Working from Home

Editor's Note: Take a look at our featured best practice, Digital Transformation Strategy (145-slide PowerPoint presentation). Digital Transformation is being embraced by organizations across most industries, as the role of technology shifts from being a business enabler to a business driver. This has only been accelerated by the COVID-19 global pandemic. Thus, to remain competitive and outcompete in today's fast paced, [read more]

Also, if you are interested in becoming an expert on Digital Transformation, take a look at Flevy's Digital Transformation Frameworks offering here. This is a curated collection of best practice frameworks based on the thought leadership of leading consulting firms, academics, and recognized subject matter experts. By learning and applying these concepts, you can you stay ahead of the curve. Full details here.

* * * *

Making remote working an option for employees doesn’t mean having to compromise on data security, in spite of what naysayers might claim.

All it takes is a few of the right policies and technologies to ensure that your business can keep up with current trends, while still protecting mission-critical information. Here are some examples to get you started down the right track.

Prevent Employees Using Personal Phones to Access Work Information

Unless you have no other option, it’s generally best to outlaw the use of personal portable devices in a work context, because data security can suffer in this scenario.

The rise of iPhone and iPad spyware means that employees might have suffered a breach without realizing it. Where possible, supplying them with separate handsets and tablets to use when on the move or working from home will let you take the reins and implement tighter controls over what apps they can install and what sites they can visit.

Implement a VPN for Connecting to In-house Systems

Remote workers will usually need to harness the same on-site resources as their colleagues in the office. If they are doing this over a network connection that you don’t have direct control over, that increases the risk of it being compromised.

This is where setting up a business VPN comes into play. With a virtual private network, team members can log into your servers and access data from anywhere in the world, with the same level of security as they’d enjoy if they were physically present on your commercial premises.

Have a Consistent Policy on Data Sharing & Software Use

You need to be unified in the way you approach the distribution of data, both for remote workers and on-site employees.

If everyone is using a different platform or approach to sharing files, it’s not only a security risk but also a problem from a productivity and efficiency perspective.

For instance, if you don’t have your own internal data storage setup, selecting a top rated file sharing platform which every employee must use will avoid common snafus.

The same goes for other types of software. Don’t let workers pick whatever service they prefer for things like instant messaging, social media management and so forth; be clear and consistent in setting out what software should be used, and in what context.

Train Employees and Review Their Progress

Employee training doesn’t have to be time-consuming, and it’s also something that pays dividends when it comes to data security.

When you roll out best practices and policies, bring remote workers up to speed with the right instruction and information on how to adhere to these rules and use the services you’ve chosen.

Also remember to provide refreshers on data security skills over time, and check that everyone is sticking to the framework you’ve set down, rather than deviating from it.

Ask Remote Workers What They Need

When working from home for the first time, it can feel like being thrown in at the deep end, and unless you get feedback from team members in this context, it’s not just security that can suffer.

Be willing to listen to input from people who are actually getting on with the home working experience from day to day, and you’ll find all sorts of useful tweaks to best practices that will make a real difference.

The Bottom Line

Being savvy about data security is a must for any business manager, especially when employees are working from home. Choose, document and implement best practices to govern this, and you’ll be impressed with the results.

77-slide PowerPoint presentation
The National Institute of Standards and Technology (NIST) Cybersecurity Framework stands as a pinnacle of guidance in the realm of cybersecurity. Developed by NIST, a non-regulatory agency within the United States Department of Commerce, this framework has garnered widespread [read more]

Want to Achieve Excellence in Digital Transformation?

Gain the knowledge and develop the expertise to become an expert in Digital Transformation. Our frameworks are based on the thought leadership of leading consulting firms, academics, and recognized subject matter experts. Click here for full details.

Digital Transformation is being embraced by organizations of all sizes across most industries. In the Digital Age today, technology creates new opportunities and fundamentally transforms businesses in all aspects—operations, business models, strategies. It not only enables the business, but also drives its growth and can be a source of Competitive Advantage.

For many industries, COVID-19 has accelerated the timeline for Digital Transformation Programs by multiple years. Digital Transformation has become a necessity. Now, to survive in the Low Touch Economy—characterized by social distancing and a minimization of in-person activities—organizations must go digital. This includes offering digital solutions for both employees (e.g. Remote Work, Virtual Teams, Enterprise Cloud, etc.) and customers (e.g. E-commerce, Social Media, Mobile Apps, etc.).

Learn about our Digital Transformation Best Practice Frameworks here.

Readers of This Article Are Interested in These Resources


Excel workbook
National Institute of Standards and Technology (NIST) U.S. Department of Commerce Cyber Security Framework Aligned. Governments, sectors, and organizations around the world are increasingly recognizing the NIST Cyber Security Framework (CSF) as a recommended cyber security [read more]


 
237-slide PowerPoint presentation
 
 
Excel workbook

About Shane Avron

Shane Avron is a freelance writer, specializing in business, general management, enterprise software, and digital technologies. In addition to Flevy, Shane's articles have appeared in Huffington Post, Forbes Magazine, among other business journals.




Complimentary Business Training Guides


Many companies develop robust strategies, but struggle with operationalizing their strategies into implementable steps. This presentation from flevy introduces 12 powerful business frameworks spanning both Strategy Development and Strategy Execution. [Learn more]

  This 48-page whitepaper, authored by consultancy Envisioning, provides the frameworks, tools, and insights needed to manage serious Change—under the backdrop of the business lifecycle. These lifecycle stages are each marked by distinct attributes, challenges, and behaviors. [Learn more]

We've developed a very comprehensive collection of Strategy & Transformation PowerPoint templates for you to use in your own business presentations, spanning topics from Growth Strategy to Brand Development to Innovation to Customer Experience to Strategic Management. [Learn more]

  We have compiled a collection of 10 Lean Six Sigma templates (Excel) and Operational Excellence guides (PowerPoint) by a multitude of LSS experts. These tools cover topics including 8 Disciplines (8D), 5 Why's, 7 Wastes, Value Stream Mapping (VSM), and DMAIC. [Learn more]
Recent Articles by Corporate Function

  

  

  

  

  


The Flevy Business Blog (https://flevy.com/blog) is a leading source of information on business strategies, business theories, and business stories. Most of our articles are authored by management consultants and industry executives with over 20 years of experience.

Flevy (https://flevy.com) is the marketplace for business best practices, such as management frameworks, presentation templates, and financial models. Our best practice documents are of the same caliber as those produced by top-tier consulting firms (like McKinsey, Bain, Accenture, BCG, and Deloitte) and used by Fortune 100 organizations. Learn more about Flevy here.


Connect with Flevy:

     
  


About Flevy.com   /   Terms   /   Privacy Policy
© . Flevy LLC. All Rights Reserved.