Cyber Safe Remote Working With Your Business Computers

//Resources

Cyber Safe Remote Working with Business Computers

With our Cyber Security Management System, you can establish cyber safe remote working today using your own business devices. This means minimising your company downtime during the transition from office to home whilst protecting your employees and business data.

For businesses where employees have access to company-owned computers/laptops (including newly purchased computers), the ease of physical transition from the office to home is relatively simple. However, remote workplace cyber security requirements can be overlooked.

Remote working increases the risk of cyber attacks (1) and can cause businesses significant extortion costs and downtime.

Even if your team is not working from home right now, our team can support you establish cyber safe remote working so the transition is seamless from office to home.

Our team can:

Implement a robust cyber safe remote working system that meets the Australian Government’s Australian Cyber Security Centres (ACSC) Essential 8 recommendations to ensure your employees, business data and confidential files are secure

Review your inhouse computer security (i.e. windows domain-based) as this may no longer be active when transitioning to a complete remove workplace

Ensure appropriate backup procedures are in place to recover local data that is lost due to either cyber attacks or human error

Schedule updates for your systems as there may be a lack of patch management without Windows update server/licenses

Consider licensing costs if computers are set up with perpetual licenses or subscription licenses for regularly used programs (such as the Microsoft Office Suite)

Recommend appropriate internet speed to ensure all employees are working from locations that have sufficient internet connection speed

Establish cloud-based phone systems so you can continue to communicate with your clients and employees

Get in touch with us today so we can solve your remote workplace needs. Or, review our Cyber Security Management System and Cyber Safe Remote Workplace Solutions.

“Cyber security is essential when preparing for COVID-19. As more staff may work from home, and the use of remote access technology increases, adversaries may attempt to take advantage. ASD’s Australian Cyber Security Centre (ACSC) encourages Australians to remain vigilant and ensure sound cybersecurity practices.”

Considerations for cyber safe remote working with business computers

There are many businesses where employees have access to business owned laptops that are used regularly either in the workplace or during travel. For these businesses, many of the requirements to establish a remote working environment are already addressed; including remote access to emails, cloud-based communications (such as skype or zoom), and cloud-based networks and data storage.
However, in addition to establishing these systems and networks, businesses also need to ensure that all cyber security systems are adequate to protect both the employee and the company. The Australian Cyber Security Centre’s (ACSC) has highlighted there is an increased risk of cyber attacks for Australian businesses due to the current Coronavirus (COVID-19) pandemic.

Our Cyber Security Management System is built to be compliant with the ACSC Essential 8 recommendations; ensuring that businesses are protected, no matter where employees work from. Implementing our solution means your company will comply with the ACSC Essential 8 Strategies and your data and employees will be protected whilst in the office, whilst travelling, or whilst working from remote locations. Our system includes:

Enable Logons@0.5x 8

Enabling Known Programs

Generating an index of approved applications which can run in trusted locations on a computer network, including on remote business owned computers.

Safety Program Updates@0.5x 8

Safeguarding Program Updates

Scheduling and installing updated and patches to fix identified vulnerabilities in software applications and programs.

Secure Ms Macros@0.5x 8

Securing MS Macros

Preventing malicious macros (often found in MS Excel or Word files) installing and running on your computer system.

Block Browser@0.5x 8

Block Browser Risks

Deciding what certain applications/programs (such as Adobe Flash and Java) are allowed to do on a system or network.

User Rights@0.5x 8

User RIghts Management

Reducing the number of people who have overarching rights to install programs, run macros and enable applications, reduces the risk that a hacker can access the system.

Safeguard Windows Update@0.5x 8

Safeguarding Windows Updates

Regular and scheduled updates of all operating systems will fix known vulnerabilities.

Secure Logon@0.5x 8

Securing Computer Logons

Establishing simple multi-factor authentication for sign-in requirements for users to log in to devices and programs.

Cloud Backup@0.5x 8

Cloud Backups

Providing an ‘if all else fails’ solution for recovering stolen, hacked, damaged or lost data, which is particularly important for employees creating data locally on remote computers.

Find Out How to Protect Your Business

man contact copy

Considerations for cyber safe remote working with business computers

Coronavirus (COVID-19) has caused business leaders to make rapid decisions regarding remote workplaces. Even businesses that can provide laptops/computers to workers need a clear plan of action to ensure minimal operational downtime. Therefore, we have pulled together a quick checklist to support your office to home transition.

1. Make proactive office closure decisions:

decide at what point you will close your office voluntarily so all employees can begin to prepare to work from home.

2. Allocate assets:

build an asset register to ensure all employees have devices allocated to them to enable remote working. This includes laptops, desktop computers, screens, mobile phones and printers if required.

3. Establish your cyber security plan:

setting up your cyber security management system prior to your office closure will aid in the rapid transition of forced remote working if required.

4. Prepare your cyber safe remote working processes:

ensure you have prepared clear instructions for your employees regarding how to access networks, how to abide by cyber safe principles and how to alert the company if something goes wrong.

5. Check all employees have adequate internet access:

we can provide recommendations on appropriate connection speeds if required.

6. Decide on any remote working reimbursements:

if employees need to upgrade their internet or phone services, will the company cover these costs?

7. Establish cloud-based communication channels:

there are plenty of online communications channels such as skype and zoom which employees can use to communicate effectively. Ensure all employees are set up before office closures.

8. Set up cloud-based phone systems:

cloud-based phone systems are a cost-effective and efficient way of keeping your landline number and still being able to communicate with your customers when working remotely. Find out more about our services here.

9. Prepare employee communications:

the earlier you communicate your plans to employees the better. Employees may be anxious about the times ahead, so confirming that you have a remote working plan in place will ease their concerns.

10. Prepare customer communications:

be clear with your customers regarding how they can still contact you whilst you are working remotely. Explain what this means for them and how you will continue to deliver your services.

    Make An Appointment

    Get in touch and discover how we can help. We aim to be in touch

    Have questions? Search our knowledgebase.