K2E Canada Inc
  • Home
  • TRAINING
    • WEBINARS
    • ROAD TO EXCELLENCE ONLINE SEMINAR
    • SEMINARS
    • TECHNOLOGY CONFERENCE
    • INSTRUCTORS
  • NEWSLETTER
    • Signup
  • ABOUT
  • CONTACT
  • BLOG
  • Home
  • TRAINING
    • WEBINARS
    • ROAD TO EXCELLENCE ONLINE SEMINAR
    • SEMINARS
    • TECHNOLOGY CONFERENCE
    • INSTRUCTORS
  • NEWSLETTER
    • Signup
  • ABOUT
  • CONTACT
  • BLOG

Responding to COVID-19 with Remote Access? Pay Attention to Security!

4/1/2020

 
As the world comes to grips with COVID-19, many businesses are responding by encouraging team members to work from home. The rationale behind this action is to reduce the possibility of a contaminated team member encountering other team members, and potentially contaminating them. Unfortunately, not everyone has thoughtfully considered the security ramifications of encouraging team members to work remotely. Consequently, many of these new remote workers may potentially and unknowingly compromise sensitive information. Read this article to learn about five security best practices you need to have in place in these environments.

Do Not Connect through Unsecured Wi-Fi

It’s an unfortunate fact, but many home wi-fi networks remain unsecured. As such, cybercriminals can intercept the data transmitted over these networks easily. Of course, this results in potentially compromising sensitive and privileged information. Therefore, if you work from home and use wi-fi, protect the network at a minimum by requiring a password to establish a connection. Remember, you should never utilize an unsecured wi-fi network, regardless of whether it is in your home, a hotel, or any other venue!

To improve security relative to your internet access while working remotely, consider the following options:
  • Connect to the Internet using wired connections. Not only will they be more secure, but they might also be faster.
  • If wired connections are not practical, secure your wi-fi connection with a strong password. You may need to re-configure your wi-fi router to add this password.

Consider Using a Virtual Private Network to Improve Remote Access Security

Virtual Private Networks (VPNs) create a secure, encrypted “tunnel” in the otherwise unencrypted Internet. Accordingly, the VPN encrypts all traffic that passes through it, even if the network itself is not encrypted. Stated differently, assuming a secure network connection (as described in the previous paragraph), a VPN adds yet another level of encryption to your data. Your IT staff may already have a VPN option in place for you. However, if they do not, you can take advantage of one of many good “personal” VPN’s, including Nord VPN, Private Internet Access, Express VPN, and CyberGhost VPN. (Click to learn more about personal VPNs.)  Either approach helps to reduce your risk of exposing confidential and sensitive information.

Be Aware of Bring Your Own Device Risk

If you work from a computer that you provide personally – as opposed to a company-provided device – are you sure that your device is adequately secured. This risk is known as Bring Your Own Device (BYOD) risk, and it can be quite significant. For devices that your IT staff maintains, they likely implemented necessary security measures already. Examples include ensuring that anti-malware software updates automatically, users do not log-in with Administrative rights on the computer, and unauthorized software cannot run on the computer. But in the traditional home computer environment, often these and other necessary security measures are not in place. Further, because several family members likely use the home computer, you run the risk of compromising data due to someone else’s actions or activities on the device.

In short, when working from home, try to use devices managed by your IT team. When this occurs, we shift the security issues associated with the computer to professionals who should have adequate training for the task. If, however, you must use your device to work remotely, at a minimum, ensure that your operating system and all your applications have the most recent updates available. Also, verify that anti-malware software is installed on the computer and is updated at least daily. These measures help to reduce BYOD risk when working from home.

Watch Out for Leaving Data Behind

Following on the previous point, be careful about where you store your data if you are working on your computer. In these situations, it is common for team members to save files on the local hard disk, as opposed to the corporate server or some Cloud-based resources. Then, when the working environment transitions back to a more routine one, and you return to the office to work, you may realize that all the files you have been working on are still on your home computer.

To address this issue, consider storing all your data on an external hard disk and then taking that hard disk with you to the office when normal operations resume. Better yet, if your organization provides access to Cloud-based storage such as OneDrive for Business, store the files there. That way, you can collaborate with either team members in real-time using Microsoft Office applications.

Is Your Office Computer Turned On?

You can use tools to control your computer in the office remotely. This approach gives you access to all the files on the device and network; it also means that you have access to all the applications installed on the computer. However, there is a downside. The downside is that, with some exceptions, you must leave the computer turned on so that you access it remotely. Of course, while the computer is on and you are not physically present in the office, unauthorized users might choose to run applications and access data from that device. Therefore, you may want to consider asking your IT staff to enable Wake-on-LAN (WoL) on your computer. Without going into a technical discussion, WoL essentially allows you to turn on your computer remotely. With this feature enabled, you won’t have to leave it running 24/7, and, in turn, you reduce your security risk.You can use tools to control your computer in the office remotely. This approach gives you access to all the files on the device and network and to all the applications installed on the computer.

Summary the Need to Improve Remote Access Security

The global pandemic caused by COVID-19 has clearly put us in uncharted territory, on many fronts. Yet business needs to continue with as little disruption as possible. One way that can happen is to work from remote locations to reduce the risk of contracting or contaminating team members. For those who work remotely on a routine basis, hopefully, the five items discussed above have already been addressed. However, for those who are suddenly working in this environment, be sure to address the issues outlined in this article to reduce the risk of compromising confidential and sensitive data. Let’s not make a challenging situation any worse because of a data breach.

Tommy Stephens

Remote Support Software link
6/9/2022 04:01:02 pm

The use of remote support software has modernized the Information Technology sector. The IT support industry, Managed Service Provider (MSP), service desk, and help desk specialists experience the benefits of using this platform.

Barcode Scanning link
6/20/2022 03:09:24 pm

Barcode Scanning can be used for inventory and pricing information, it is possible to quickly obtain data on both. Barcodes can be customized to contain other relevant information as needed.

Barcode Scanning App link
6/20/2022 03:18:17 pm

Once you've installed the barcode scanning app, your device's camera can be used as a scanner. You can then take different actions depending on the content contained in the barcode.

Scanning A Barcode link
6/20/2022 03:23:02 pm

Take a photo of the document you'd like to scan. Adjust scan area: Tap Crop . Take photo again: Tap Re-scan current page . Scan another page: Tap Add.

Scanning Barcode link
6/20/2022 03:29:39 pm

Most smartphones have built-in QR scanners, which are sometimes built in the camera. A QR scanner is simply a way to scan QR codes.

Barcode Scanning System link
6/20/2022 03:36:57 pm

Barcode Scanning System is a network of hardware and software, consisting primarily of mobile computers, printers, handheld scanners, infrastructure, and supporting software.

Inventory Barcode Scanning System link
6/20/2022 03:45:21 pm

Inventory scanners are wireless, which makes it easy to scan a product wherever it's stowed. Inventory scanners work by scanning the barcode found on the product.

Barcode Scanning System For Small Business link
6/20/2022 03:51:43 pm

Most standard inkjet and laser printers can print barcodes with a label sheet. However, thermal printers are best for Barcode Scanning System For Small Business.

Barcode Scanning System For Inventory link
6/20/2022 03:59:55 pm

Barcode Scanning System For Inventory is just a way of presenting a basic amount of information, so you simply type the item number you want into your field service software or barcode printing software and out comes the barcode version of that number.

CRM Customer Relationship Management link
6/23/2022 02:54:53 pm

CRM Customer relationship management is a technology for managing all your company's relationships and interactions with customers and potential customers.

CUSTOM IMPLEMENTATION SERVICES link
6/24/2022 02:53:48 pm

Custom implementation services depend on a comprehensive and systematized approach. It starts with design to testing to help users attain optimal outcomes from software solutions promptly.

back office customer service link
10/24/2022 06:00:07 am

The downside is that, with some exceptions, you must leave the computer turned on so that you access it remotely. Thank you, amazing post!


Comments are closed.

    Categories

    All
    2022
    Accountant
    Accounting Software
    Accounting Solutions
    Adobe
    Advisory
    AI
    Artificial Intelligence
    Automation
    Backup
    Bitcoin
    Blockchain
    Business Automation
    Business Continuity
    Business Intelligence
    Business Management
    Cloud Computing
    Collaborate
    Collaboration
    Colonial
    Computer
    COVID 19
    COVID-19
    CPA
    CRM
    Cryptocurrency
    Customer Relationship Management
    Cybersecurity
    Cyptocurrencies
    Dext
    Doc.It
    Ecommerce
    Emerging Technologies
    Entrepreneurs
    Excel
    Forecasting
    Forecast Sheet
    Google
    Grammarly
    HR
    Internal Controls
    Internal Priorities
    KPIs
    LET
    Links
    Management Reports
    Microsoft 365
    Microsoft Office 2021
    Microsoft Teams
    Office
    Office 365
    Online Shop
    Outsourcing
    Pandemic
    Paperless
    Personal Computer
    PivotTables
    Power Automate
    Power BI
    PowerPoint
    Productivity
    QuickBooks
    Quickbooks Online
    Ransomware
    Receipt Bank
    Remote Work
    RPA
    Sage 50
    Security
    Small Business
    Small Business Accounting
    Small Business Accounting Software
    Stockhistory
    Technologies
    Technology
    Tech Update
    Windows
    Windows 10
    Windows 11
    Word
    Work At Home
    Workflow
    Work From Home
    Xcm
    Zoho
    Zoho CRM

    Authors


    Ward Blatch
    Ward provides consulting and training services as the Managing Director of K2E Canada Inc. He joined K2E Canada in 2005 and is responsible for the Canadian operations of this international consulting group, which provides professional development technology education for accountants across Canada and the US. Ward lives in rural Nova Scotia and can be reached at ward@k2e.ca.

    Tommy Stephens
    Tommy is one of the shareholders in K2 Enterprises, affiliating with the Firm in 2003 and joining as a shareholder in 2017. At K2, Tommy focuses on creating and delivering content and is responsible for many of the Firm's management and marketing functions. Tommy resides in the metro Atlanta area. You may reach him at tommy@k2e.com.

    Randy Johnson
    Randy is a nationally recognized educator, consultant, and writer with over 40 years experience in Strategic Technology Planning, Accounting Software Selection, Paperless, Systems and Network Integration, Business Continuity and Disaster Recovery Planning, Business Development and Management, Process Engineering and outsourced managed services. Randy can be reached at randy@k2e.com


    Bernie Smith
    Bernie coaches businesses to develop meaningful KPIs and present their management information in the clearest possible way to support good decision making. As the owner of Made to Measure KPIs, he has worked with major organisations including HSBC, Airbus, UBS, Barclays, Credit Suisse, Lloyds and many more.

    RSS Feed

Training & Education

Webinars
Road to Excellence Online Seminar
Seminars
Conferences
Instructors

Tech News

K2E Canada's Tech Update Newsletter

More

Privacy Policy
About
Contact

K2E Canada Inc.  |  484 Scarlett Crescent  |  Burlington, ON L7L 5M2  |  (902) 200-9207
© 2022 K2E Canada Inc. ALL RIGHTS RESERVED.