Many companies are embracing “remote teams” and allowing their employees the opportunity to work from home or telecommute. However, home IT devices are still subjected to many of the same threats as on-site business devices. Unsecured off-site routers, modems and other network devices can cause big headaches for employers, and poorly configured home devices can affect the entire organization. The Center for Internet Security Inc. (CIS) has published the CIS Telework and Small Office Network Security Guide to help combat this issue.
According to Forbes, 38 percent of teleworkers lack the technological support they need to do their jobs. The guide offers recommendations for purchasing equipment and basic network and device setup to help organizations secure their remote employees’ home routers and modems against digital threats. Securing these network devices is critical as they act as an on-ramp for internal networks to access the internet. As a result, they are subject to scans and attacks from outside networks. The threat surface grows as teleworking expands.
Threats can include:
“As businesses and individuals gain productivity through remote access and telework, they have to match that with a focus on security,” said Tony Sager, executive vice president at CIS. “The CIS Controls team created this guide to identify the most important security steps and configuration settings for your devices to help you improve your defenses and maintain confidence in your data and operations.”
The guide includes a network security checklist, and tells users how to map security configurations to the CIS Controls, giving employees cybersecurity protection at their remote location.
While the guide is directed toward companies and other organizations, it can also be used for personal use. CIS encourages teleworkers and other individuals to configure the security options of their commodity network devices in accordance with this guidance to help thwart future cyber-attacks.
Here’s a security checklist of configurations recommended by the Center for Internet Security Inc. that should be put into place after the correct network device is purchased. It is possible that some of the steps below are not applicable to your situation.
Copyright © 2004-2019 American Land Title Association. All rights reserved.
This article has been used and reprinted with the permission of The American Land Title Association. The material is for general information purposes only and is not to be relied upon or used for any particular purpose. Title Industry Assurance Company, RRG and The American Land Title Association shall not be held responsible in any way for, and specifically disclaims any liability arising out of or in any way connected to, reliance on or use of any of the information contained or referenced in this article. The information contained or referenced in this article is not intended to constitute and should not be considered legal or professional advice, nor shall it serve as a substitute for the recipient obtaining such advice.