Here are three key areas for managers to consider in establishing a cyber ready workforce:
- What devices will people use to connect and access information?
- How will they connect to access the information?
- How will they access, manage and protect the information?
The first step is to determine the devices (computers, laptops, smartphones, etc.) your employees will use to connect remotely and to keep a list. Here are useful guidelines for you to consider and share:
- If employees are using a company-issued device from home:
- Remind employees to adhere to your password/passphrase and software update policies.
- If employees are using personal devices:
- Have completely different passwords/passphrases for work and personal use
- Install and run virus-scanning software
- Update all software before connecting to your organization’s network
- Turn-on auto-update for all software
- Turn-on multi-factor authentication whenever it is offered
- If employees are using shared personal devices (with a spouse, children, etc.):
- Close and quit all applications at the end of each work session
- Log-out, close and quit from databases or web browsers
- Do not write down passwords/passphrases and leave them on or near the computer
- Do not store passwords/passphrases in the device or use auto-login
- If employees are using public computers (like a park, libraries, cafes, etc. – if they are open):
- This use should be strongly discouraged and only done if essential
- Quit and re-open any applications that were already open
- Use private browsing on the web browser if possible
- Close and quit all applications, including web browsers, at the end of each work session
- Never save any documents to the public computer
- If you use a USB drive, which is strongly discouraged, never put it in a public computer
Next, determine how employees will connect to the Internet to remotely access your systems and data.
- If employees are using a personal Wi-Fi connection from their home
- Change the existing Wi-Fi password/passphrase before starting to work remotely
- If employees are using a company-provided or personal hotspot
- Always use the hotspot instead of public Wi-Fi
- If employees are using a public Wi-Fi
- In general, employees should avoid using public Wi-Fi unless your organization has a Virtual Private Network (VPN) that people know how to use it
Access and Data Management
The third area to consider is what information and systems people will access. Related to this is how they transfer, share and save work. Here are a few key considerations, especially for employees that may not be used to working at home. We’ll go into more detail on this topic in a follow-up guide.
- List what systems and data each person can access in normal operations
- Will there need to be any changes in what they can access when they are working remotely?
- Concerning the use of USBs, it is best to ban them and provide cloud-based file-sharing to transfer, share and store data.
- If your organization has a “no USB” policy remind people of it and stress how important it is to follow the policy while working remotely
- If your organization allows the use of USBs (not a good idea), provide each employee with one that has been scanned for malware. Tell employees they can only use it on the primary computer they will use to work remotely AND to make sure they have virus-scanning software on the computer BEFORE they insert the USB
- Sharing and saving work for remote workers may bring up new challenges.
- If your organization has been using centralized file-sharing (OneDrive, Google Drive, i-Cloud, Box, Drop Box, etc.), employees will be used to managing how they collaborate to work on documents.
- If not, you need to establish guidelines for how employees manage and share the documents:
- Ideally, you should set-up a file-sharing site.
- In the meantime, have employees send the documents as encrypted email attachments. Many of the main email applications (Outlook, Gmail, Apple Mail, etc.) allow attachments to be encrypted. There are companion programs that provide encryption for emails and attachments (Virtu, Tutanota, VMware Boxer, Symantec Desktop Email Encryption, Encryo, etc.)
- Your guidance should cover document naming and some basics of version control. If people are saving work documents onto a personal device, you need a way to prevent having multiple versions of the same document.
Look for more advice and tools from us in the coming weeks. We are committed to being a key resource in helping SMEs balance remote work and cybersecurity. Feel free to contact us with questions, comments or success stories (email@example.com).
About the Expert:
Craig Moss is an Executive Vice President at Ethisphere. Previously, he was Chief Operating Officer of CREATe Compliance and the Center for Responsible Enterprise And Trade (CREATe.org). At Ethisphere, he is responsible for developing Leading Practices, a program designed to help companies and their suppliers reduce the risks associated with trade secret theft, counterfeiting, piracy, and corruption.
He has developed definitive guides for organizations including World Bank Group’s International Finance Corporation and the United Nations. Mr. Moss is an Executive Advisor for Social Accountability International (SAI) and previously led Social Fingerprint®, a program helping companies and their supply chains implement sustainability practices. Previously, Mr. Moss founded Global Access Corporation, where he led more than 3,000 business development projects in 50 countries.
About the Cyber Readiness Institute:
The Cyber Readiness Institute is a non-profit initiative that convenes business leaders from across sectors and geographic regions to share resources and knowledge that inform the development of free cybersecurity tools for small and medium-sized enterprises (SMEs). The self-guided, online Cyber Readiness Program is available in Chinese, English, French, Spanish, Portuguese, Arabic, and Japanese. To find out more, visit www.becyberready.com.