The Rush to Secure Remote Working

Written by Oliver Pinson-Roxburgh on 17/03/2020

8 business security tips for working from home

Many organisations are acting to prevent the spread of Coronavirus by allowing their employees to work from home. In order to be able to do so comfortably, and without introducing a component of risk, businesses should follow certain best practices that can guarantee their digital assets are just as secure with a remote workforce as they would be in-house.

Unfortunately, cybercriminals have already started to take advantage of this pandemic. From the Coronavirus heat map that included malware, to the phishing emails aimed at scaring recipients, threat actors are opportunistic and will try to capitalise on peoples’ vulnerability in this difficult moment.

Bulletproof’s experts have compiled a list of practical security steps to assist business owners, managers and IT teams in devising their strategy for protecting their organisations while employees work remotely.

Threat actors are opportunistic and will try to capitalise on peoples’ vulnerability in this difficult moment
  1. 1

    1. Training

    Phishing training is already in place at most organisations, and rightly so, since malicious emails remain one of the most popular entry vectors. Given the number of coronavirus-themed emails that have been circulating, it would be worth putting in place a short refresher of email hygiene best practices to warn employees of possible scams.

    The rules remain the same:

    1. Ensure the email is coming from a trusted source – always check the spelling of senders’ names and hover over links to check that they are directing you to a legitimate website. Be wary of health organisations’ spoofed domains and do not download attachments unless from a trusted source.
    2. Make sure the business is communicating directly to the staff.
    3. Always question the wording of emails themselves: although given the circumstances a tone of urgency is probably appropriate, before completing any action it is worth reading the email twice. It’s always better to take a little longer to complete a task than to click on the wrong link and have information compromised.
    4. For any concern, follow the protocol and inform the team in charge, that being IT or Information Security.
Phishing Training
  1. 2

    2. Keep trusted applications secure

    When working from home, you should connect to the business’ VPN or to its trusted, secure applications when working with sensitive data.

  1. 3

    3. Don’t store personal information on personal devices

    If you are working from a personal device, it’s always best to work via the Cloud as much as possible. Personal devices are by definition more vulnerable, therefore, it is worth being extra careful to avoid the machine getting compromised and files being stolen.

Threat actors are opportunistic and will try to capitalise on peoples’ vulnerability in this difficult moment
  1. 4

    4. Protect your privileged identities

    If you are an administrator of systems and are granted privileged credentials, use two-factor authentication. Any employee with access to sensitive data should also have stronger authentication measures in place. It may take a little longer to access certain systems, but it is ultimately one of the best ways to ensure that only the right people have access to certain data.

    According to the principle of least privilege, employees should only be granted permissions appropriate for their role, and access to mission critical systems should be restricted.

Secure Access
  1. 5

    5. Avoid shared computers

    If you have not been issued a device from your organisation and need to use a computer that you share with other users, the most secure option is to access Cloud application services (Office 365, G Suite, etc) through your web browser, rather than the app.

Cloud application services (Office 365, G Suite, etc)
  1. 6

    6. IT staff should be extra vigilant

    Monitor your servers for suspicious remote worker activity on all services and if possible, use conditional logging (restrict access to regions your remote workers are in, and scrutinise impossible travel).

If you are an administrator of systems and are granted privileged credentials, use two-factor authentication
  1. 7

    7. Company-owned devices should be hardened

    If you are planning to issue devices to employees to allow them to work remotely, you should harden them by installing monitoring tools and checking endpoints. Cloud services should also be hardened, and Office 365 users should follow the security centre advice around best practices.

Cyber Security
  1. 8

    8. Scan continuously

    Internet facing systems should continue to be scanned for potential new vulnerabilities and patch releases. If you have a limited capability to apply patches, hold calls to discuss how to best prioritise them.

    If these practices are followed, organisations can make the shift to remote working to protect employees and to slow down the spread of this virus without compromising their security posture.

    Temporarily (and swiftly) changing the way we work may seem like a dauting task, but it is possible, and will ultimately help protect employees and the most vulnerable in our society who can’t afford to take risks.


Gain peace of mind with your security

Mobile working and remote system access means some businesses can continue to operate, however this exposes new risks that need to be managed to avoid a serious security breach.

We can help your organisation identify these risks and work with you to put the right security measures in place. We provide an unrivalled range of security and compliance services including penetration testing, vulnerability assessments and 24/7 proactive threat monitoring - all tailored to suite any size organisation.

Contact us today to gain peace of mind and find out how you can avoid cyber security issues for your organisation and employees. Email: info@bulletproof.co.uk.




  • Bulletproof are CREST approved

    CREST approved

  • Bulletproof are ISO 27001 and 9001 certified

    ISO 27001 and 9001 certified

  • Bulletproof are Tigerscheme qualified testers

    Tigerscheme qualified testers

  • Bulletproof are a PCI DSS v3.2 Level 1 service provider

    PCI DSS v3.2 Level 1
    service provider

  • Bulletproof have 24/7 on-site Security Operations Centre

    24/7 on-site Security
    Operations Centre

Get a quote today

If you’re interested in our services, get a free, no obligation quote today by filling out the form below.

By submitting this form, I agree to the Bulletproof privacy policy.