Chat with us, powered by LiveChat
5 Tips for Data Security When Working Away from the Office

5 Tips for Data Security When Working Away from the Office

5 Tips for Data Security When Working Away from the Office

One of the biggest advantages of the internet is that it has enabled business users to work away from the office. With technology such as laptops and smartphones, we can work from home and when commuting and take our data with us when we go to meet clients. While this brings a range of benefits, it also creates an increased responsibility to keep that data secure. In this post, we’ll give you some tips on how to achieve that.

1. Backup regularly

Imagine that one of your employees develops a lucrative project for a client and is travelling to meet them. Imagine, too, that the only copy of the project is stored on the employee’s laptop. There are numerous weaknesses in this scenario. The laptop can break, it can get stolen or it can become one of the many that get mislaid by travellers every day. 12,000 laptops a week are left abandoned just at US airports.

The possible consequences of this are that the months of work put into the project are wasted and the lucrative contract is lost.

By backing up your data regularly, however, this problem can be completely eradicated. If the laptop is lost, you’ll still have another copy of the data to use. While backing up can be done simply by saving data to a USB drive, the best option is to use a cloud backup service. You can’t lose cloud storage like you do a pen drive and you’ll be able to access the data from any machine with an internet connection.

2. Turn unused devices off

Another security loophole is that people don’t always realise that a laptop with the lid shut is still vulnerable to attack. Closing the lid simply initiates a low-power sleep mode designed to bring the machine back to life quicker than rebooting. While the hard disk powers down, the laptop’s memory continues to be active and can be accessed and copied using an external USB port. What’s perhaps worse, is that for encrypted laptops, the vulnerable memory can contain the encryption keys giving hackers access even to encrypted data.

The solution is simple, when devices are not in use, they should be shut down, not put into sleep mode.

3. Use encryption

Encryption turns your data into an unintelligible string of characters that even the boffins at GCHQ couldn’t unscramble without an encryption key. It means that even if your raw data was hacked or stolen, no-one would be able to make sense of it.

As a safety precaution, all devices used out of the office should be protected with encryption software. Such apps can keep personal files, contacts, notes, wallets and multimedia files secure, as well as backing up your passwords, recording unauthorised login attempts and sending notifications of attempted hacks.

At the same time, those companies which store their data in the cloud should make sure that this too is encrypted, so that if a user gains access to the machine, there is another layer of protection to prevent them getting hold of the data stored online.

4. Network protection

Another potential vulnerability is someone getting access to data via an attack on the network. Devices are particularly vulnerable when they connect to mobile hotspots with weak security and it is here, in places like transport stations and public areas that hackers may make attempts to steal your data.

One of the first steps you should take is to ensure employee’s devices have a properly configured firewall that will block suspicious connection requests. As a company, you should ensure the firewall configuration is put in place by your own IT team, whether this is on a company device or on a personal device that an employee uses for work.

Another security feature is the use of Virtual Private Networks (VPNs) which will protect the users’ devices when they connect to any network away from the business premises. Though the connection is not as fast, the data will be automatically encrypted, preventing it being compromised by those seeking out victims on public networks.

5. Use cloud storage

Using cloud storage can really help boost the security of your data. For a start, as data is held centrally on the server, there is no need to have a separate copy of it stored on the laptop or other device. This way, if the device is lost or stolen, there is no data to steal. As data stored in the cloud can be encrypted, even if someone has access to the laptop, they will not be able to access the data without the encryption key, for which further authentication should be needed. The other benefit, of course, is that keeping data stored centrally means that should one person update a file, everyone else will have access to the latest version. When separate versions are stored across many different devices, it can be difficult to know which is the most up to date.

Conclusion

While the internet has given us better ways to work and communicate and freed us from the confines of the office, it does create risks that we need to manage effectively. Data stored on devices can be stolen by hackers accessing the hardware or from intrusion over a network. Hopefully, the tips provided here will help prevent this happening and keep your company’s devices and data secure.

If you are considering cloud storage for your data and backups, check out our cloud hosting packages.

Sharing

Leave your comment