5 Security Concerns for Remote Workers

What security flaws are exposed when a user moves from a secure corporate office network to their home – either as part of a WFH initiative or global pandemic?


Employees in office are protected by the company network’s firewall; employees working from home typically rely on weak or non-existent ISP network protection.
As a result, employee devices can become infected, moving laterally and potentially infecting corporate devices on the network.

Require VPN access back to the corporate network for internet trac, helping security and bandwidth. All employees should change home networking equipment’s default password.


Employees using personal equipment such as PCs, tablets, phones, etc. can quickly become an attack vector and security risk. Without the security software issued on corporate devices such as endpoint protection, VPN, DNS filtering, etc. all sensitive company data passing through that device is at risk.

Mobile Device Management (MDM) allows IT to remotely control, update or wipe devices. MDM solutions can be used on company issued devices (helping with management and billing) or for BYOD.


Majority of all breaches come from an end user clicking on something they shouldn’t. Being out of office, IT is not just a few steps away to quickly quarantine a compromised device.

Proper training and awareness are even more important. Employees need to know what to do should they suspect a device has been infected or when a device is lost/stolen.


The same vein of protecting users from themselves, employees can easily fall prey to phishing scams or impersonating emails.
Email security solutions integrate with SaaS mail services such as Office365 or G-Suite to safeguard email attacks.

Today’s houses are filled with smart devices – light bulbs, fridges, TVs – all connected to the internet. IoT devices have a long way to catch up with necessary security and introducing a corporate device onto a network shared with IoT devices can be dangerous.

This is where network segmentation through two connections, VLANs, VRFs, etc. can ensure the trac stays separate.