{"id":6930,"date":"2020-03-26T10:07:07","date_gmt":"2020-03-26T15:07:07","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6930"},"modified":"2020-03-26T10:08:42","modified_gmt":"2020-03-26T15:08:42","slug":"how-to-secure-home-computers-that-are-connected-to-corporate-networks","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-to-secure-home-computers-that-are-connected-to-corporate-networks\/","title":{"rendered":"How To Secure Home Computers That Are Connected To Corporate Networks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Coronavirus is changing everything. But amid all the talk of shut-downs, quarantine, and stock market crashes, another huge impact of the current crisis has been a little overlooked: it\u2019s consequences for cybersecurity.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">With hundreds of thousands of employees now working from home \u2013 in the US, Europe, and all over the world \u2013 many companies have had to rapidly put in place systems for them to connect their home devices to corporate networks. Whilst most companies now know how to secure their business systems, including <\/span><a href=\"https:\/\/www.poweradmin.com\/help\/latestsmhelp.aspx?page=monitor_web_page.aspx&amp;ref=blog\"><span style=\"font-weight: 400;\">monitoring their websites<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.poweradmin.com\/products\/server-monitoring\/?ref=blog\"><span style=\"font-weight: 400;\">monitoring their servers<\/span><\/a><span style=\"font-weight: 400;\">, few realize that implementing secure remote working systems requires a similar level of focus on securing home networks.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/03\/home-picture.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6931 size-full\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/03\/home-picture.jpg\" alt=\"\" width=\"724\" height=\"482\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/03\/home-picture.jpg 724w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2020\/03\/home-picture-300x200.jpg 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\"><\/a><\/p>\n<p><span style=\"font-weight: 400;\">In this guide, we\u2019ll take a look at how to protect home devices that are connecting to corporate networks.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><b>Lock Down Devices<\/b><\/h2>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">The first step in doing this is to ensure that the devices that employees are using to connect to corporate networks are secure in themselves. When employees are working in the office, IT staff have a high level of control over the network and can ensure that their <\/span><a href=\"https:\/\/www.sitelock.com\/blog\/2019\/05\/business-cyber-threat-intelligence\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">cyber threat intelligence<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\"> secures the perimeter of it. Once employees start using their home devices, they open themselves \u2013 and your network \u2013 to a new level of threat.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Employees should ensure that the security software on their home devices is up to date, and should be taught <\/span><a href=\"https:\/\/www.cloudwards.net\/how-to-set-up-a-strong-password\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">how to set up a strong password<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\">. Ideally, they should also segment the accounts they use at home from those they are using for work: this can be achieved by asking them to set up new usernames on their home computers, which they will use only for work.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">When working remotely, employees are also likely to have to store sensitive data on their home devices. They should, therefore, receive training on <\/span><a href=\"https:\/\/www.paymill.com\/en\/blog\/in-a-gdpr-world-how-small-business-should-store-data\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">how businesses should store data<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\">, including the importance of encryption even on their home devices.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><b>Lock Down Home Networks<\/b><\/h2>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s equally as important that the home WiFi networks that employees use to connect to corporate networks are secure. If employees do not normally work from home, it\u2019s unlikely that they\u2019ve taken the basic steps necessary to secure their home networks, so now is the time to do that.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/heimdalsecurity.com\/blog\/home-wireless-network-security\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">Securing a home WiFi network<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\"> is not difficult. Employees should change the default password on their router, and enable network encryption. They should also ensure that their router is not physically accessible, and hide their IP address where possible.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">For most employees, these steps will be enough to ensure security. For more senior employees who are executing critical business functions such as contacting customers or <\/span><a href=\"https:\/\/www.getweave.com\/payment-processing-for-businesses\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">payment processing<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\">, a few further steps are necessary. These should include disabling DHCP functionality on home networks, and configuring corporate servers to only accept connections from static, trusted IPs. They should also implement a firewall on their home network so that only your corporate network can connect directly to their machine.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">These steps should be applied across all devices that connect to home networks: not just desktop computers on which employees will be working, but any tablets or smartphones that will be connected to the same network whilst they are connecting to corporate systems.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><b>Connectivity<\/b><\/h2>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Finally, it\u2019s important to look at the security of the connections between home devices and corporate networks. How this is done will depend on how employees are connecting to corporate systems.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">For some applications, employees will connect directly to corporate cloud storage or programs running directly on corporate servers. For these systems, employees working remotely should be given a VPN and taught how to use it. This will ensure that the data exchanged between their home devices and the corporate network is encrypted, and cannot be intercepted.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">For many tasks, however, employees will not be connecting directly to corporate systems. For instance, if an employee is charged with updating your website, they will likely log into your CMS directly from home. For most businesses, given that <\/span><a href=\"https:\/\/hostingdata.co.uk\/wordpress-statistics-usage-market-share\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">32% of websites on the internet<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\"> run on WordPress, that will mean logging into WordPress from home. Ensuring the security of this connection is more difficult, but can be achieved by routing employee\u2019s connections through a proxy server overseen by IT staff.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><b>Challenges and Opportunities<\/b><\/h2>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s long been argued that remote work presents both opportunities and challenges for businesses: that it <\/span><a href=\"https:\/\/thriveglobal.com\/stories\/remote-work-career-opportunity-or-potential-train-wreck\/\" target=\"_blank\" rel=\"nofollow\"><span style=\"font-weight: 400;\">is either an opportunity or a potential train wreck<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-weight: 400;\">. For businesses rushing to implement remote work solutions during a crisis, this is doubly true. If employees are forced to begin working from home, you should ensure that every system they use \u2013 from their home device to their home network to their connection to corporate servers \u2013 is protected, and this is going to take a significant investment of resources.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, moving to a remote work environment presents opportunities for businesses as well. Setting up the security precautions above has been important in <\/span><a href=\"https:\/\/www.poweradmin.com\/blog\/how-to-get-the-most-out-of-your-team-collaboration-app\/\"><span style=\"font-weight: 400;\">getting the most out of your team collaboration app<\/span><\/a><span style=\"font-weight: 400;\"> for years before the current crisis. Equally, the current crisis has focused minds on the importance of ensuring the security of home networks when working remotely.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Get these systems in place now, in fact, and you will be well prepared for the future, in which remote working is going to play a huge part. Just ensure that you also continually monitor your systems, particularly at times of change such as when you <\/span><a href=\"https:\/\/www.poweradmin.com\/blog\/how-to-decommission-a-data-center\/\"><span style=\"font-weight: 400;\">decommission a data center<\/span><\/a><span style=\"font-weight: 400;\">, in order to keep them secure long into the future.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Coronavirus is changing everything. But amid all the talk of shut-downs, quarantine, and stock market crashes, another huge impact of the current crisis has been a little overlooked: it\u2019s consequences for cybersecurity. \u00a0 With hundreds of thousands of employees now working from home \u2013 in the US, Europe, and all over the world \u2013 many [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":6931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13],"tags":[],"class_list":["post-6930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6930"}],"version-history":[{"count":2,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6930\/revisions"}],"predecessor-version":[{"id":6934,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6930\/revisions\/6934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6931"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}