It is only too common for people to have very different personalities in the office as they do during their off hours, with different standards and practices to suit them. While there is absolutely nothing wrong with that on the surface, you need to be sure that they are at least upholding the kind of security best practices that you expect of them in the office while they are at home.
Let’s go into why this is, and what these practices should look like.
Okay, stay with us here—there are a few steps that we need to go through to get from point A to point B.
Chances are that your team members are likely somewhat lax in their security practices when their own data is concerned. This means we can confidently say that, without oversight, simplicity will likely win out over the admittedly less convenient best practices.
While you should be ensuring that all devices that connect to your business network are updated and abide by certain best practices, like password quality and the like, you aren’t exactly standing over their shoulder while they’re browsing from home.
With so many people now working remotely—potentially from devices they own, not the ones you’ve provided—this can quickly become an issue. With poorly managed and maintained devices accessing your business’ resources, you are exposed to greater risks.
Obviously, this isn’t acceptable. To help minimize the impact that lax security practices could potentially have, you need to reinforce the importance of properly adhering to what is recommended in the office while at home.
Interested in learning more about any of these practices? Give Jackson Thornton Technologies a call to discuss your options with us, along with any of your other business-IT related questions. Dial (877) 226-9091 today.
Comments