APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Key Practices in Cybersecurity and Privacy for Effective Working from Home

    authentication (especially if employees are using their own devices to obtain such access). Because employees cannot communicate in person, multi-factor authentication and strong passwords are more important.  

    Key Practices in Cybersecurity and Privacy for Effective Working from Home

    By

    Apac CIOOutlook | Friday, March 26, 2021

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    authentication (especially if employees are using their own devices to obtain such access). Because employees cannot communicate in person, multi-factor authentication and strong passwords are more important.

    Fremont, CA: As reported in the news, the abrupt shift to employees working from home creates new cybersecurity risks for companies and employees who work remotely. The following are ten critical measures that can help mitigate these significant risks.

    Tightly Control and Access Encrypt Data to Encrypted Data

    Encrypting data at rest and in transit remains critical to information security. Employees should be instructed to save their job on the employer's system (rather than on company-owned or personal devices). When working with third-party vendors, review contract terms to ensure adequate data protection.

    Implement Secure Devices to Remote Employees

    Most employee-owned personal computers lack significant malware and encryption protections, and hackers are still exploiting personal computer vulnerabilities. Such flaws raise the risks to data on these personal computers as well as data accessed from those computers (including data that resides on company servers accessed remotely). This is critical for organizations subject to the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and other regulatory schemes. Given these vulnerabilities, employers may want to require workers to keep all work data on company-owned devices and avoid cloud-sharing apps that have not been vetted for privacy and security. Restricting the diversity of storage repositories helps limit the number of potential avenues of attack.

    Improve Password Strength, VPN Security, and Telephone/Video Conference Protections

    Access to the employer's virtual private network (VPN) can require multi-factor

    authentication (especially if employees are using their own devices to obtain such access). Because employees cannot communicate in person, multi-factor authentication and strong passwords are more important. Reiterate the importance of using strong passwords and keeping those passwords secure. Weak or stolen passwords continue to be a major source of information security breaches.

    Inform workers who discuss confidential matters over the phone or through videoconference of the dangers of intruders listening in and seeing such conversations. Such intrusions are minimized by sending conference coordinates (such as a meeting identification number) and passwords separately. Turning on participant identification features and using technology that allows a moderator to delete unexpected participants will assist in ensuring that only approved people participate.

    See Also  :- Top Cyber Security Solution Companies

    More in News

    The Journey Towards Smart City Development

    The Journey Towards Smart City Development

    Harnessing Big Data Analytics to Enhance Business Strategies

    Harnessing Big Data Analytics to Enhance Business Strategies

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Impact of Digital Transformation on Retail

    Impact of Digital Transformation on Retail

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/key-practices-in-cybersecurity-and-privacy-for-effective-working-from-home-nwid-8067.html