Protecting Networks in Today’s At-Home Workspaces

  • 1


The rise of remote working is not purely the result of COVID-19’s impact. After all, remote teams and companies are pretty normal these days. But we can say with certainty that many companies have been forced by the novel coronavirus to adjust their operations towards home-based workers and scattered offices.

Unfortunately, in many countries, there was little time to prepare for the major upheaval. Where a business’ admin was once centralized and controlled from a single office, now, companies must contend with decentralized operations and staff working from and connecting to home networks.

This poses a serious concern. With multiple networks and new devices involved in the daily 9-to-5, the risk of data breaches, malware infection, confidentiality leaks, and other security concerns is doubled.

Here, we go over a few of the key risks that go hand in hand with working from home and offer up some simple and actionable solutions.

The Risks

Businesses keen to keep their digital systems as healthy as possible will do well to consider the following risks and take steps to mitigate them.

Data breaches

Data breaches can occur in a number of ways. Perhaps the one we first imagine when we think of a breach is a bad actor physically accessing then stealing local files. But more often than not, breaches are the result of a cybercriminal infiltrating data sources remotely and bypassing existing network security.

With more people working from home, the number of access points leading into a company’s servers or networks is exponentially increased — think of all those additional wifi networks and staff-owned devices that are used when people work from home.

When the number of access points is increased, the potential for a breach is greater, proportionate to the number of new networks and devices being used.

Malware Matters

Malware is nasty enough on an individual user’s computer or device, but when a malicious program gets its hooks into a company’s network and proliferate, the results can be disastrous.

Adding insult to injury, the number of malware programs targeting COVID-concerned citizens has taken a rise of late. Dressed up as World Health Organisation emails, text messages from the government, and more, malware is making its way in the world on the back of fear and confusion. All it takes is for one staff member to unwittingly download a file and pass it on to other team members or the company’s network and a virtual hell can break loose.

BYOD (Bring Your Own Device)

Further blurring the boundaries between workspace and home is an increasing culture of BYOD, bring your own device. While some companies are lucky enough to have enough company devices to go around, others are facing no choice but to let staff work on their own computers.

This is troublesome as businesses can invest thousands per year to secure their systems. In the case of blue-chip companies, the cybersecurity budget can surpass a million. Sophisticated firewalls, intrusion detection bots, antivirus, malware detection software, and more mean a centralized network is better protected.

With BYOD, companies essentially have to trust staff to take the proper precautions. If staff devices travel between networks, attackers can tailgate and breach the company’s system.

The Solutions

Despite the heightened risk, there are basic, common-sense steps a company can take to ensure network security.

VPN Security

Virtual Private Network (VPN) technology shields data through tunneling, a process that effectively hides data transmissions from prying eyes as they travel from point A to point B or computer A to computer B. During transmission, the data is encrypted, making it very difficult for would-be cyber crime to intercept or otherwise interfere with the data. In fact, even point A and B are hidden from view as a VPN hides IP addresses.

All staff should make sure they have VPN software installed and active before starting work, handling any company files, or accessing cloud storage systems. Although many staff will have VPN software already, companies should be cautious. A single trusted provider and a company contract are best. Then, staff can download a VPN for the different devices they will work on.

Password Basics

Remind staff that 123cat, their child’s birthdate, and the name of their pet dog are not effective passwords. Staff log-in details should require passwords of at least 12 characters that contain a random mix of upper and lower case characters, special symbols, and numerals.

Antimalware and Antivirus Protection

Offer staff the ability to download company provided antimalware and antivirus protection. As with VPNs, a single company contract with the provider is best and means that each staff member is using a trusted and reliable program.

Spoofing and Phishing

While the filters provided by antivirus and malware programs should filter out much of the junk trying to reach employees, some will still get through. Educate staff on the risks posed by spoofing and phishing attempts, show them how to avoid these threats, and recognize falsified emails and web pages.

The following two tabs change content below.

Feel free to leave a comment

Do NOT follow this link or you will be banned from the site!

Privacy Preference Center


The __cfduid cookie is used to identify individual clients behind a shared IP address and apply security settings on a per-client basis.

cookie_notice_accepted and gdpr[allowed_cookies] are used to identify the choices made from the user regarding cookie consent.

For example, if a visitor is in a coffee shop where there may be several infected machines, but the specific visitor's machine is trusted (for example, because they completed a challenge within your Challenge Passage period), the cookie allows Cloudflare to identify that client and not challenge them again. It does not correspond to any user ID in your web application, and does not store any personally identifiable information.

__cfduid, cookie_notice_accepted, gdpr[allowed_cookies]


DoubleClick by Google refers to the DoubleClick Digital Marketing platform which is a separate division within Google. This is Google’s most advanced advertising tools set, which includes five interconnected platform components.

DoubleClick Campaign Manager: the ad-serving platform, called an Ad Server, that delivers ads to your customers and measures all online advertising, even across screens and channels.

DoubleClick Bid Manager – the programmatic bidding platform for bidding on high-quality ad inventory from more than 47 ad marketplaces including Google Display Network.

DoubleClick Ad Exchange: the world’s largest ad marketplace for purchasing display, video, mobile, Search and even Facebook inventory.

DoubleClick Search: is more powerful than AdWords and used for purchasing search ads across Google, Yahoo, and Bing.

DoubleClick Creative Solutions: for designing, delivering and measuring rich media (video) ads, interactive and expandable ads.



The _ga is asssociated with Google Universal Analytics - which is a significant update to Google's more commonly used analytics service. This cookie is used to distinguish unique users by assigning a randomly generated number as a client identifier. It is included in each page request in a site and used to calculate visitor, session and campaign data for the sites analytics reports. By default it is set to expire after 2 years, although this is customisable by website owners.

The _gat global object is used to create and retrieve tracker objects, from which all other methods are invoked. Therefore the methods in this list should be run only off a tracker object created using the _gat global variable. All other methods should be called using the _gaq global object for asynchronous tracking.

_gid works as a user navigates between web pages, they can use the gtag.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The gtag.js tagging library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.

_ga, _gat, _gid