Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Best Practices For Working Remotely

Here are a few best practices for working remotely as a new wave of cyberattacks targeting those working from less secure computers hits during the Coronavirus/COVID-19 outbreak. 

As cities and states impose social-distancing measures, businesses are sending their workers home to work, this massive, unprecedented shift to distance working brings with it a whole new set of cyber security challenges. 

For instance, a lack of IT resources can hurt many organizations and when workers are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge.

 
 
As an employer, the first step is to conduct a remote-work exercise with your key executives and business leaders to ensure security is covered. Also, inventory your business applications and follow up with your providers to inquire about their business security plans. 
 

For on-premises applications that require VPN connectivity, test and validate that VPN connectivity for higher utilisation than usual.

Next, employee education is more important than ever right now. Make sure your employees are not only up-to-speed with the latest information on the coronavirus and how to protect themselves and their families, but all the increased potential for fraud and cyberattacks following it.

 
Also, an important practice is to make risk-assessments of your remote workers’ computing setups. Finding out which systems they will connect to and from which devices is paramount. 
And in the case that your business is hacked or your data is compromised, you need to involve cyber security experts to handle the Cyber Incident Response. We are those experts. Contact us immediately. 
You can find out more about our cybersecurity breach and incident response services as well as employee education solutions. 

CATEGORIES

Cyber Security - Data Breach - Defence - Penetration Testing - Process

TAGS

Business cybersecurity - coronavirus - coronavirus outbreak - cyber - cyber attack - cyber risk - cyber security - cyber security monitoring - cyber security training - cyber security vulnerability - Cyber Strategy - Cybersecurity - work from home - working from home - working remotely

SHARE

PrevPreviousHow Is Coronavirus/COVID-19 Linked To Malicious Software?
NextCOVID-19 Incident Response PlanNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.