• Home
  • Managed Security
    • Managed Security
    • Managed Detection and Response
    • Security as a Service
  • Services
    • Cyber Risk and Technical Assurance
      • Segmentation and Zero Trust
      • Penetration Testing
      • Infrastructure security assessment
      • Secure Architecture Development
  • About Us
  • Resources
    • Cyber Security Blog
    • Case Studies
    • Cyber Security FAQs
  • Contact Us
  • Menu Menu

11 Cyber Security Tips for Working Remotely

SME's, Threat Protection

With the coronavirus pandemic in full swing, more and more businesses are making the switch to working remotely. This brings about new challenges, particularly when it comes to cyber security.

Small and medium sized enterprises are having to deal with a wealth of new problems that working remotely brings; everything from insecure home-networks, staff using personal devices, sharing of sensitive information over the cloud, complying with legal guidelines and using shared family computers for work.

SME’s have had to quickly adapt to this new way of working and in the meantime, cybersecurity can easily be overlooked. However, teams working remote can be one of the biggest risks in cyber security. Cyber threats are often underestimated, and it is easy to forget the risk whilst working from your kitchen table.

Staff need to be aware that the same cyber security measures are just as important when working from home as they are in the office.

Hackers and cybercriminals are taking advantage of the vulnerabilities that have arisen from working remotely, so it is vital that employers and staff are all aware of the risks and ensure safe cyber security measures are being put in place, when working from home.

Here are 11 cyber security tips for SME’s working remotely:

Use company devices

Use a company owned laptop or device that is properly secured to reduce the risk of data breaches when managing sensitive information and data online. This is a far better way of safeguarding than employees using a variety of personal devices which could have outdated software and security measures.

If you are running an SME and simply do not have the means to provide every member of staff with their own device, then think about employing a secure remote desktop service. Providing employees laptops have the adequate amount of protection, this solution means all of the data will be stored on the office device and staff members personal devices are merely acting as a display.

Install internet security at home

If employees are using personal devices whilst working remotely then it is a good idea for them to install internet security at home. The usual home internet security antivirus software may be too basic for staff working for home. It is important that all home computers are just as secure as those in the office.

women working remotely on laptop

Be aware of common scams

It is important to know what the most common cyber security scams are, so you know what to watch out for. Small and medium sized enterprises can be in a particularly vulnerable position if they are not aware of the threats to their organisations. Being aware of how such threats work, for example spear phishing attacks, increases the likelihood that you will spot the threat before it is too late.

Ensure the safety of your devices

We are not just talking about internet safety here; you also need to make sure your devices are physically safe and not being put in a position where they could be easily stolen. Whilst most of this is pure common sense, it is also just as easy to get lapse with our judgement, particularly if we are not used to working from home, and in a more relaxed environment. Those of you who have young children need to be particularly vigilant that your work computer does not fall into the wrong hands! Devices should automatically lock if you are not using them, and ensure they are not left on when out of the room, especially if there are kids around. Preferably when leaving the house, any devices with sensitive work-related information on should be secure in a locked room.

Avoid using USB thumb drives

Portable storage devices should be avoided if possible. If a member of staff saves confidential and sensitive information to a USB thumb drive, and then looses it, the chances are there for anyone to pick it up- and you certainly don’t want that information falling into the wrong hands. On another note, USB drives have been known to have been placed by hackers near the place they are trying to attack, in an attempt for colleagues to pick up the drives and plug them into staff computers to find disruptive malware which will lock their system. Shockingly, this happens more than you might think.

Use secure VPN’s

Virtual private network’s (VPN’s) allow a secure and encrypted communication between a device and a remote network. This is an excellent way to secure private information being compromised if a hacker is stealing data from public Wi-Fi services or attempting to attack an unprotected private home network. When choosing a VPN ensure that your data is properly secure and will not be passed on to a third party.

cyber security tips - using a vpn

Two factor authentications (2FA)

Two factor authentication (2FA) provides an extra level of protection when logging in to secure networks. You may need to provide a username and password, and then again, another method of identity such as a code from a SMS message. This means that if a hacker gains access to your password, they still will not be able to login using your credentials, as they do not have access to your phone.

Backup data

All company data should be regularly backed (preferably a double backup) and stored in an offline location. This is a vital way of protecting data in case of a ransomware attack. In such an attack, the hackers will steal your data and demand a ransom in order to get it back. If you are running a small enterprise, you may not have the funds for the ransom and may be at risk of loosing important data.

Setup firewalls

All your networks should have a firewall installed to protect your computer from potentially harmful sites. Firewalls are essentially filter’s, they control all the information coming in from other sites and computers, allowing some communication through and restrict what it believes to be harmful threats. At Cube Cyber we have next generation firewall services that can help you block threats and reduce costs.

Keep updated and patch systems

Old and outdated software has vulnerabilities that hackers can easily use to get into your computer. All operating systems need to be regularly patched and updated to help keep your business secure. Hackers will always find weak points in devices and networks using outdated software, so it is important that systems are updated as soon as a new update comes out, or better yet install auto updates.

Get the right training

The weakest link in cyber security is usually the human factor. People make mistakes, even the smartest amongst us will occasionally click on a dodgy link after being fooled into think it was something else. Good training on cyber security is essential for the safeguarding of company information. Staff members need to be aware of phishing attacks and what to look for in a spammy email, which can look incredibly realistic at times. Regular training sessions and keeping staff up to date on the latest cyber threats will reduce the risk of someone unknowingly giving away sensitive company information.

Using these cyber security tips should help to implement good protection measures across your company. If you found this article useful, then give it a share and let us help spread good cyber awareness across the board.

December 9, 2020/by Andrew Oshea
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
  • Share by Mail
https://cubecyber.com/wp-content/uploads/2020/12/working-remotely-cartoon.jpg 853 1280 Andrew Oshea http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Andrew Oshea2020-12-09 03:47:452022-11-24 11:10:2711 Cyber Security Tips for Working Remotely

Quick Search

Latest Insights

  • 5 Ways Cisco Umbrella Strengthens Our MDR ServiceNovember 29, 2023 - 6:15 am

    We know too well in today’s digital age; the safeguarding of your organisation’s digital assets is important. However, you can’t prevent what you can’t see.   Our Managed Detection and Response (MDR) service is crafted to elevate advanced threat detection, investigation, and response capabilities, augmenting internal security measures.   Cisco Umbrella takes centre stage in fortifying our […]

  • How Can SMEs Tackle Escalating Security Challenges? 5 Minutes with Andrew O’SheaOctober 26, 2023 - 2:02 am

    SMEs face a host of security challenges. They lack the resources and scale of large enterprises, meaning that within the skills-constrained environment in Australia, it’s challenging to find and hire the right talent.  With limited budgets, a lack of expertise, inadequate security tools and a lack of training, cybercriminals are increasingly targeting SMEs as “easy […]

  • SASE – Secure Access Service Edge: A Simple OverviewApril 21, 2022 - 11:01 pm

    Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), […]

  • Beginners Guide to Cloud Computing & How it Can Help Small BusinessesMay 13, 2021 - 5:16 am

    With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based […]

  • Top 7 Cyber Attacks Threatening SME’s (and how to prevent them)May 13, 2021 - 5:14 am

    Small and medium sized enterprises (SME’s) frequently underestimate the need for cyber security protection. This miscalculation could end up being a risky strategy for those not willing to invest in the best preventative measures for their business. Just because an enterprise is small, does not mean it is not at risk from the top cyber […]

  • GDPR Cyber Security and How It Might Impact Your BusinessMarch 2, 2021 - 11:45 am

    The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security? What is GDPR? First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th […]

  • How to Prepare A Cyber Defence Plan for Your EnterpriseFebruary 12, 2021 - 4:56 am

    No business, small or large is not at risk from a cyber attack. From small businesses to huge government organisations, all companies must ensure they have an excellent cyber defence plan in place. Planning what to do in a cyber attack is just as important as managing active preventative measures. Many smaller enterprises do not […]

Choose Category

  • Advanced Development Capability
  • Assessment and Insights
  • Case Studies
  • Cloud Services
  • Cube News
  • Cyber Attacks
  • Cyber Crime Australia
  • Enterprise
  • Expert Advice
  • Incident Response
  • Industry
  • Internet of Things
  • Large Corporation
  • Managed Protection
  • Operational Technology
  • Remote Working
  • SME's
  • Threat Protection
  • Vulnerability Assessments

Wondering how much our solutions cost?

GET A FREE QUOTE

Not sure yet? Get a Free Trial now.

GET A FREE TRIAL

ABOUT CUBE CYBER

About Us
Contact Us

CALL 1300 085 366

SERVICES

Cyber Risk & Technical Assurance
Segmentation and Zero Trust
Penetration Testing
Infrastructure security assessment
Secure Architecture Development

MANAGED SECURITY

Managed Security
Managed Detection & Response
Security-as-a-Service

RESOURCES

Cyber Security Blog
Case Studies
Cyber Security FAQs

ISO 27001 CERTIFIED

© CubeCyber 2023. All Right Reserved | Designed & Developed by Escope

Types of Cyber Threat Actors and Their MotivationsIT Cyber Security for SME’s is Important Now More Than Ever
Scroll to top

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this.

Accept & Close

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy