Keeping Your Teleworkers Secure

February 16, 2010

Today we have a sponsored post from Brian Brian Lapidus the Chief Operating Officer of Kroll Fraud Solutions. Many companies worry about telecommuter security and Brian is here to share some tips for keeping your telecommuters secure. Take it away Brian!

Telecommuting, whether full-time or part-time, is becoming increasingly popular in the United States. According to a 2008 survey from the Society for Human Resource Management, 57 percent of HR professionals indicate that their organization offers some form of telecommuting. The potential rewards are many – from increased productivity and cost savings to happier employees and greater appeal among potential recruits.

Despite the benefits, telecommuting ranks high on the list of data security threats for organizations, particularly if there is no formal policy in place. The most common missteps include using unsecured networks, sharing company laptops or equipment with family members and friends, and failing to update software and install security patches, among others.

Fortunately, there are certain measures that every organization can take to minimize the risks:

1. Establish a baseline by assessing all current telecommuting activities. Even if no employees are formally authorized to work remotely, chances are it happens anyway – think sick children, inclement weather and other unexpected events. The technology afforded to most office workers allows them to do a substantial amount of work from a remote location. Many employees take advantage of this fact to “work from home” during an emergency or to “catch up at home” when work starts to pile up. Regardless of the reason, the threat of data breach is very real, and must be assessed.

2. Develop a comprehensive telecommuting security policy. A clear and concise security policy that establishes the roles and requirements of employees is absolutely essential to ensuring a successful telecommuting program. The policy should specifically outline security measures and procedures for handling sensitive data, including storage and disposal. While the focus will undoubtedly be on cyber security, organizations should make sure to address the proper handling of paper files. Consider providing employees with shredders or secure storage containers to meet this requirement.

3. Make decisions on equipment usage. An organization’s policy on equipment usage is an important component to an organization’s telecommuting security policy (see #2). Organizations should decide up front whether telecommuting employees will use personal computers or company-issued equipment, as this will be a major factor in what cyber security measures can and cannot be implemented. Providing equipment gives the company more control over security issues, but employees must be provided with explicit instructions for the care and usage of the devices (i.e., never leave laptops unattended in public, never download and install programs without company approval). Even if the organization allows employees to use their own PCs, certain minimum security measures must be in place, such as firewalls, anti-virus and spyware programs, and encryption software.

4. Provide adequate technical support and training. Before sending employees home with sensitive company information – whether via laptop or hard copy file, they should be trained on the requirements set forth in the organization’s telecommuting security policy. In the case of laptop and network use, ensure that employees fully understand how to access data securely. Remote workers should be trained periodically in techniques to spot suspicious activity, including signs that a computer has been infected with malware. Access to technical support is also an important factor – without support, an employee might be tempted to do whatever it takes to get the system up and running when something goes wrong, including disabling security features.

5. Conduct periodic audits. Even if the company’s IT department has remote management capability, it’s important to verify firsthand that all equipment is in good condition and working properly. Have employees bring in equipment periodically for a checkup, and review logs to determine what information has been accessed.

As a final word of caution, organizations should not assume that they can solve security issues by restricting employee access to applications and systems. After all, productivity will be negatively impacted if remote workers don’t have access to the tools and information necessary to perform. Most importantly, don’t let the cons outweigh the pros. Organizations that face the risks of telecommuting head on with comprehensive security policies and sound cyber security measures will be free to reap the rewards that telecommuting can provide.

Brian Lapidus, chief operating officer for Kroll’s Fraud Solutions division, has unique frontline experience helping today’s businesses safeguard against and respond to data breaches. At Kroll, Lapidus oversees a highly-skilled team that includes veteran licensed investigators specializing in supporting breach victims and restoring individuals’ identities to pre-theft status. Lapidus is also a regular contributor to the Kroll blog A Dialogue on Data Security.

http://credit-n.ru/kredity-online-blog-single.html http://credit-n.ru/potreb-kredit.html

Previous post:

Next post: