How to implement safe and secure remote working

Follow these best practices when working out of the office

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Fostered by availablebroadbandconnections, remote working has been a growing trend over the last several years - whether for a day here and there, or full time off-site work. With Covid-19 resulting in many offices shut down, this movement has been pushed even further.

When working out of the office, there are plenty of things you can do (or ask your employees to do) to make sure you remain safe. Some are practical tips that you can action immediately - downloading aVPNorantivirussoftware, for example. While others are much more revolved around mindset.

End-to-end encryption from a VPN

End-to-end encryption from a VPN

This time five years ago, only IT technicians had really heard of virtual private networks. Now - largely thanks to their ability tounlock foreign Netflix cataloguesand get around other blocked websites - VPNs are a commonly downloaded bit of software.

When it comes tobusiness VPNs, the number one priority is security. Once installed and turned on, all the data shared between companies and their employees will be kept encrypted at both ends. That means super security. And the best proponents maintain a fast enough connection between servers that you’ll barely notice any difference at all to your everyday life online if you have it working away in the background.

Antivirus software

Antivirus software

With all of the malware out there, a defense on each and every device you own has become a necessity. It is therefore important to implement a robust antivirus solution, for protection - we have a full rundown of thebest business antivirusout there right now.

Also, make sure that it is kept up to date with the latest virus signatures, and that provides real time protection. Finally, the solution needs to protect from spyware, andransomwareas well, which can sometimes require a combination of products.

Strengthen the logins

Login credentials are a key aspect of computer security, and it is important to choose a strong password. This involves a longer password, twelve or more characters, with a random combination of lowercase and uppercase letters, numbers, and symbols. It can be difficult to keep track of so many passwords, so apassword manageris a useful tool, too.

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Sometimes, despite best efforts, passwords become compromised. Therefore, the additional protection oftwo-factor authenticationshould be implemented to provide another layer of security.

Separate work/life

Working from home can certainly blur the lines between work life and home life as we answer another email after business hours, or have meals with our phone at our side. However, there should be a division, with work occurring on dedicated company devices, that won’t be in danger of being compromised from personal computer activities after hours.

Back up your data

Nobody wants to lose data, particularly when it involves ‘Work product’. Working in the office allows the company to backup data, but this responsibility often shifts to the remote worker.

So keep in mind the 3-2-1 rule of data, which indicates that there should be three copies of data, on two different media, one of which should be offsite to keep your hard work safe at all times.

Avoid public Wi-Fi

When out in public, open Wi-Fi is often available…and quite unsafe. As these public Wi-Fi spots have no password, or only a shared password, data can be easily poached as it is transmitted, resulting in a data breach. Using themobile broadbandconnection on your phone is a step in the right direction as it is considered more secure, but the better solution is to encrypt all data before transmission via your VPN no matter what network you are on.

Phone charging station

Devices need charging when out of the office, with the smartphone leading the list as it gets used most often. Many establishments offer USB charging stations, and conveniently located so patrons can juice up their phones.

However, in some cases, the offer of free electricity is really a way that the data on the phone can be downloaded. The defense is to use a USB data blocker, also known as a ‘USB condom.’ This useful, protective device has the data pins removed so that the electric can flow to charge the device, but no data can be possibly transmitted as it lacks the pathway to travel.

Jonas P. DeMuro is a freelance reviewer covering wireless networking hardware.

3 reasons why PIA fell in our best VPN rankings

Is it still worth using Proton VPN Free?

This super-cheap HP Victus 15 gaming laptop just dropped to its lowest price yet