Our Cybersafe Remote Working Solutions can support your employees to work securely from home using their own private computers and devices. Our solutions are designed to mitigate risks of cyber-attacks whilst enabling employees, and businesses, to remain productive and operational in the event of an office closure.
BYOD – Bring Your Own Device – workplaces are common place for employees working from home with personal computers, or, for contractors collaborating with teams. Whlist we will always advise that best practice is to provide all remote working employees with a company computer that is cybersecure, sometimes this is not feasible.
Therefore, allowing staff and contractors to use their private computers to continue working may be the best solution for both businesses and employees. Our Cybersafe Remote Workplace Solutions enable employees to securely access and continue their work – whilst using their own computer or device. Our system supports both businesses with remote connection access, as well as businesses that utilise cloud-based programs and applications. For both situations, our team can:
Implementing a cybersafe remote workplace with BYO computers and devices will vary for most businesses, therefore, we recommend getting in touch with us today so we can discuss your needs. Alternatively, review our Cybersafe Remote Workplace Solutions and Cybersecurity Management Systems.
If your employees have access to business computers, see our Cybersafe Remote Workplace: Business Computers Solutions.
There are essentially two models that enable employees and contractors to work remotely using their own computers and devices:
Businesses that have established a terminal server will be in the fortunate position where all employees can access their ‘normal’ workplace computer via any laptop or desktop computer. This can be achieved by a Remote Desktop Terminal such as Teamviewer or LogMeIn.
We still recommend all office-based computers implement the ACSC’s Essential 8 requirements, and all businesses implement strict Multi-Factor Authentication to access the server.
For businesses who are unable to provide employees with a company computer and don’t have access to an inhouse server, working from home can only be achieved via the employee utilising their own private computer. This means employees will be logging into cloud-based applications (e.g. Xero, CRM Systems, Adobe Creative), using cloud-based document management systems (e.g. Dropbox, Google Drive) and undertaking emails and work on Office 365.
Whilst there are large cybersecurity risks with this option, if this is the only option for your business in the short term, we can help. Our focus is to ensure your business is as protected as possible from cyber-threats, whilst not impeding on your employees personal and private computer use.
The Australian Cyber Security Centre’s (ACSC) has highlighted there is an increased risk of cyber-attacks for Australian businesses working from home in the current climate stating that:
“Cyber security is essential when preparing for COVID-19. As more staff may work from home, and the use of remote access technology increases, adversaries may attempt to take advantage. ASD’s Australian Cyber Security Centre (ACSC) encourages Australians to remain vigilant and ensure sound cyber security practices.”
For employees using their own computer to undertake work, cybersecurity risks are unfortunately even greater. This is due primarily to the lesser cybersecurity systems that are in place for home computers vs office computers.
When implementing your cybersafe remote workplace with private computers, here are a few key cyber threats to look out for:
We can support you to establish the right Cybersecurity Management System for your business needs – both in the office and whilst remote working.
Get in touch with our friendly team, we can provide you with all of the information you need to make the best decision for your business.Contact Us