To help offset our carbon footprint, we have partnered with One Tree Planted to plant trees for each sale of computer hardware at no additional cost to our clients

let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

info@domain.com
example@domain.com

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

,

Your Family Members are Part of your Company’s Network Security Environment Are they up for the task?

  • By SouthridgeTech
  • 1083 Views

As we all navigate the new normal in our (somewhat) post-pandemic workplaces, many of us have found the line between home and work to be quite blurred. Zoom has introduced us to our colleagues’ dogs and our bosses’ kids’ naptime routines. And we’ve all made accommodations to make space for our professional lives in our homes.

However, one highly critical adjustment is often overlooked – security. Our family members are now a key component of our business security environment. While you and your staff may maintain a tight security environment in the office, as a father of two who works largely from home, I know how easy it is to let our guard down while working from the dining room table. Please consider that the effectiveness of your IT network’s defenses depends upon the people who use it. And at home, those people might include your family.

Most security breaches occur due to human error. As an employee, you are the frontline of your company’s defense. To fully honor that responsibility, your home network must be considered an extension of the corporate environment, and your family must be considered part of your team. My youngest son began playing videos games when he was 5 and could barely read the text on the buttons that said things like, “Click here to play for free.” Even my older son, who at 13 knows what click-bait is, is not always able to recognize it. Bad actors breached the NSA. My kids are smart, but they’re no match for the caliber of criminals who are banging at our door. In fact, it’s their natural curiosity that can lead to catastrophe.

Moreover, if you’re an employer with remote staff, your responsibility to provide training and resources for best practices may extend to your team’s family. Here are a few best-practice standards that may be in place in the office, but could easily overlooked at home, putting your business, your customers, and your staff in harm’s way.

  • Having separate devices for work and home is foundational to good security practices. If use of personal equipment cannot be avoided, use your own workstation, and keep it as close as possible to office security standards.
  • Security software provided by your company, follow company data protection measures, and do not mix personal browsing and activities while working.
  • Use company-designated VPNs and avoid free, public Wi-Fi.
  • Guest network to isolate the company laptop or desktop.
  • Strengthen your passwords and consider passphrases.
  • Never save corporate passwords on your personal device.
  • Always lock your workstation when leaving home office area. Leaving your work device unlocked during off hours or just stepping away for a few minutes while family or guests are around is dangerous and irresponsible.
  • Do not let others use your corporate workstation.
  • Only company email accounts should be used for work-related correspondence.
  • Educate family members on security risk with emails. Help your family understand the public nature of the internet and its potential dangers. Remind them that they are responsible for ensuring that their online activities are safe and private.
  • Teach your family to question everything! When it comes to cybersecurity there’s no “Innocent until proven guilty.” Assume every link, every message, and every attachment is dangerous and potentially lethal, and must be fully vetted by a responsible. Don’t assume a product is secure just because it is from a reputable company. Remember even Google Chrome was compromised.

Start by asking yourself and your teammates these questions:

  1. What devices and apps have family members downloaded?
  2. Have privacy and security guidelines been updated in my work from home environment?
  3. Has my family been educated in phishing links?
  4. Did I change the default password to my router?
  5. Do all my accounts have 2FA?

Let Southridge help. Our security team is vigilant in defending against potential cyberattacks on our clients. We are experts in identifying risk and exposing compromised credentials. We partner with companies who are in the forefront of cybersecurity and offer products and services such as Azure, Microsoft 365, Dark Web scanning, phishing simulations, secure data storage, and end-user training that are foundational to a secure network. If your network includes home offices, give us a call at (203) 431-8324 or drop us an email at support@southridgetech.com and let’s get those offices functioning safely.


About Jairo Romero
Jairo Romero is the Client Development Specialist and a member of Southridge’s Security Team. With over 8 years in IT, Jairo is an expert in computer hardware and software applications and specializes in web design and development. Jairo lives in Stratford Connecticut with his wife, Arleth and their two active boys.

Southridge Technology is a Connecticut based, whole-systems management IT service provider specializing in cybersecurity and industry compliance; business continuity; WAN management, communications, and email hosting; cloud storage and backup solutions; and live, local, real-time monitoring and emergency response 24/7/365. We support organizations whose sizes range from one desktop to systems with over 400 endpoints. Our clients include both non-profit and private industries throughout the US.