{"id":12406,"date":"2023-01-11T01:01:36","date_gmt":"2023-01-11T06:01:36","guid":{"rendered":"https:\/\/flevy.com\/blog\/?p=12406"},"modified":"2023-03-28T16:15:37","modified_gmt":"2023-03-28T21:15:37","slug":"5-important-best-practices-for-keeping-data-secure-when-employees-are-working-from-home","status":"publish","type":"post","link":"https:\/\/flevy.com\/blog\/5-important-best-practices-for-keeping-data-secure-when-employees-are-working-from-home\/","title":{"rendered":"5 Important Best Practices for Keeping Data Secure When Employees Are Working from Home"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\"alignright size-medium wp-image-12407\" src=\"http:\/\/flevy.com\/blog\/wp-content\/uploads\/2023\/01\/pexels-photo-5725575-300x200.jpeg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/flevy.com\/blog\/wp-content\/uploads\/2023\/01\/pexels-photo-5725575-300x200.jpeg 300w, https:\/\/flevy.com\/blog\/wp-content\/uploads\/2023\/01\/pexels-photo-5725575-1024x683.jpeg 1024w, https:\/\/flevy.com\/blog\/wp-content\/uploads\/2023\/01\/pexels-photo-5725575-768x512.jpeg 768w, https:\/\/flevy.com\/blog\/wp-content\/uploads\/2023\/01\/pexels-photo-5725575.jpeg 1125w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Making remote working an option for employees doesn\u2019t mean having to compromise on data security, in spite of what naysayers might claim.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All it takes is a few of the right policies and technologies to ensure that your business can keep up with current trends, while still protecting mission-critical information. Here are some examples to get you started down the right track.<\/span><\/p>\n<h2><b>Prevent Employees Using Personal Phones to Access Work Information<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Unless you have no other option, it\u2019s generally best to outlaw the use of personal portable devices in a work context, because data security can suffer in this scenario.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rise of <\/span><a href=\"https:\/\/www.certosoftware.com\/insights\/how-to-remove-spyware-from-an-iphone-or-ipad\/\"><span style=\"font-weight: 400;\">iPhone and iPad spyware<\/span><\/a><span style=\"font-weight: 400;\"> means that employees might have suffered a breach without realizing it. Where possible, supplying them with separate handsets and tablets to use when on the move or working from home will let you take the reins and implement tighter controls over what apps they can install and what sites they can visit.<\/span><\/p>\n<h2><b>Implement a VPN for Connecting to In-house Systems<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Remote workers will usually need to harness the same on-site resources as their colleagues in the office. If they are doing this over a network connection that you don\u2019t have direct control over, that increases the risk of it being compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where <\/span><a href=\"https:\/\/www.techradar.com\/vpn\/how-to-choose-and-set-up-a-business-vpn\"><span style=\"font-weight: 400;\">setting up a business VPN<\/span><\/a><span style=\"font-weight: 400;\"> comes into play. With a <a href=\"https:\/\/nordlayer.com\/learn\/vpn\/what-is-vpn\/\">virtual private network<\/a>, team members can log into your servers and access data from anywhere in the world, with the same level of security as they\u2019d enjoy if they were physically present on your commercial premises.<\/span><\/p>\n<h2><b>Have a Consistent Policy on Data Sharing &amp; Software Use<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">You need to be unified in the way you approach the distribution of data, both for remote workers and on-site employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If everyone is using a different platform or approach to sharing files, it\u2019s not only a security risk but also a problem from a productivity and efficiency perspective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, if you don\u2019t have your own internal data storage setup, selecting a <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3632983\/top-file-sharing-services-dropbox-box-google-drive-onedrive-more.html\"><span style=\"font-weight: 400;\">top rated file sharing platform<\/span><\/a><span style=\"font-weight: 400;\"> which every employee must use will avoid common snafus.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same goes for other types of software. Don\u2019t let workers pick whatever service they prefer for things like instant messaging, social media management and so forth; be clear and consistent in setting out what software should be used, and in what context.<\/span><\/p>\n<h2><b>Train Employees and Review Their Progress<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Employee training <\/span><a href=\"https:\/\/flevy.com\/blog\/5-ways-to-save-time-with-on-the-job-training-for-onboarding\/\"><span style=\"font-weight: 400;\">doesn\u2019t have to be time-consuming<\/span><\/a><span style=\"font-weight: 400;\">, and it\u2019s also something that pays dividends when it comes to data security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you roll out best practices and policies, bring remote workers up to speed with the right instruction and information on how to adhere to these rules and use the services you\u2019ve chosen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also remember to provide refreshers on data security skills over time, and check that everyone is sticking to the framework you\u2019ve set down, rather than deviating from it.<\/span><\/p>\n<h2><b>Ask Remote Workers What They Need<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When working from home for the first time, it can feel like being thrown in at the deep end, and unless you get feedback from team members in this context, it\u2019s not just security that can suffer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be willing to listen to input from people who are actually getting on with the home working experience from day to day, and you\u2019ll find all sorts of useful tweaks to best practices that will make a real difference.<\/span><\/p>\n<h2><b>The Bottom Line<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Being savvy about data security is a must for any business manager, especially when employees are working from home. Choose, document and implement best practices to govern this, and you\u2019ll be impressed with the results.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Making remote working an option for employees doesn\u2019t mean having to compromise on data security, in spite of what naysayers might claim. All it takes is a few of the right policies and technologies to ensure that your business can keep up with current trends, while still protecting mission-critical information. Here are some examples to&hellip;&nbsp;<a href=\"https:\/\/flevy.com\/blog\/5-important-best-practices-for-keeping-data-secure-when-employees-are-working-from-home\/\" rel=\"bookmark\"><span class=\"screen-reader-text\">5 Important Best Practices for Keeping Data Secure When Employees Are Working from Home<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":12407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-12406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/12406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/comments?post=12406"}],"version-history":[{"count":2,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/12406\/revisions"}],"predecessor-version":[{"id":12599,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/posts\/12406\/revisions\/12599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/media\/12407"}],"wp:attachment":[{"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/media?parent=12406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/categories?post=12406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/flevy.com\/blog\/wp-json\/wp\/v2\/tags?post=12406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}