{"id":1492,"date":"2021-08-06T09:09:47","date_gmt":"2021-08-06T14:09:47","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=1492"},"modified":"2024-03-26T01:09:59","modified_gmt":"2024-03-26T06:09:59","slug":"security-measures-to-take-when-working-remotely","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/","title":{"rendered":"Security Measures To Take When Working Remotely"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1492\" class=\"elementor elementor-1492\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5bfa29 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5bfa29\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e88da09\" data-id=\"e88da09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c69420 elementor-widget elementor-widget-text-editor\" data-id=\"1c69420\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Working remotely provides a variety of benefits for both employers and employees. Those benefits alongside the need for safer working conditions amidst the COVID-19 pandemic have created an increased demand for remote access solutions for businesses of all sizes. Regardless of industry, business owners must adapt daily operations to meet the needs of telecommuting. This means finding workable, reliable, and efficient remote access solutions that prioritize functionality. In addition, businesses must consider the security risks associated with remote access and address those risks proactively.<\/p><p>Here, we\u2019ll discuss the security risks businesses can face when working remotely as well as steps that can be taken to mitigate them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-378a27f elementor-widget elementor-widget-image\" data-id=\"378a27f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg\" class=\"attachment-large size-large wp-image-1496\" alt=\"Secure Cell Phone\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0c1668 elementor-widget elementor-widget-heading\" data-id=\"b0c1668\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Risks for Remote Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84be125 elementor-widget elementor-widget-text-editor\" data-id=\"84be125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When businesses think of shifting to telecommuting, they often overlook the unique security challenge that remote access poses. So, how are the risks of remote working solutions different than in-office work environments?\u00a0<a href=\"https:\/\/www.is-t.net\/blog\/guide-to-remote-office-setup\/\" target=\"_blank\" rel=\"noopener\">Remote work environments<\/a>\u00a0are usually not as safeguarded as in-person situations because there are more workstations, devices, and networks that expose the organization to potential cybersecurity threats. Employees working at home are usually not working within the same safety protocols of in-office networks. This makes it easier for cybersecurity threats to breach the company system through corrupted links, phishing, weak network security, and more.<\/p><p>However, despite the increased risk of cybersecurity threats to remote workers, there are steps that businesses can take to mitigate risks and create a safer environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d94c73 elementor-widget elementor-widget-image\" data-id=\"8d94c73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely2_IST.jpg\" class=\"attachment-large size-large wp-image-1495\" alt=\"Remote Security Padlock\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely2_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely2_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely2_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8ab43f elementor-widget elementor-widget-heading\" data-id=\"c8ab43f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securing Your Network for Remote Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5772f63 elementor-widget elementor-widget-text-editor\" data-id=\"5772f63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before implementing a work-from-home solution for your employees, be sure to take proper cybersecurity steps to ensure that your business\u2019s network is protected. Some of the steps businesses can take include:<\/p><ul><li><strong>Set Up Cloud Applications<\/strong> \u2013 Applications such as Microsoft Office 365 allow employees to have access to business systems, files, and email while under the protection of strict security measures.<\/li><li><strong>Utilize a VPN <\/strong>\u2013 VPNs, or Virtual Private Networks, work similarly to firewalls in that they protect users while working online. VPNs provide much of the same level of security as in-office networks.<\/li><li><strong>Create a Remote Working Security Policy <\/strong>\u2013 Most cybersecurity issues that businesses face occur due to situations that could be prevented with proper security best practices. Enacting a policy for employees that prioritizes safety while working online can help them understand what to do and what not to do to keep the business safe.<\/li><li><strong>Manage Employee Devices<\/strong> \u2013 Devices that are used to access the organization\u2019s online systems should be protected with antivirus, email, and internet security software.<\/li><li><strong>Implement Password\/Dual Authentication Protocol <\/strong>\u2013 All employees should be subject to forced password changes as well as dual authentication for all work-related devices and programs.<\/li><li><strong>Perform Regular Software &amp; Application Updates <\/strong>\u2013 Regardless of what type of software or applications your business is using, always perform updates as recommended.<\/li><li><strong>Set Up Backup\/Disaster Recover Protocols<\/strong> \u2013 In the event of a cybersecurity threat, a <a href=\"https:\/\/www.is-t.net\/managed-it-services-houston-tx\/complete-data-backup-disaster-recovery-houston\">BDR solution<\/a> can ensure that business files and systems are safely and securely backed up and redundant.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-068e69e elementor-widget elementor-widget-heading\" data-id=\"068e69e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Take Smart Security Measures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fa276e elementor-widget elementor-widget-text-editor\" data-id=\"6fa276e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As you can see, there are many steps that must be taken when shifting to remote working solutions. For many businesses, the process of migrating business systems to a remote solution and taking all necessary steps to ensure the safety and security of said solution is overwhelming and at times confusing. That\u2019s why many experts recommend working with an experienced IT provider. With their years of proper knowledge and experience, IT professionals can streamline the process and ensure the best possible security for your organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Working remotely provides a variety of benefits for both employers and employees. Those benefits alongside the need for safer working conditions amidst the COVID-19 pandemic have created an increased demand for remote access solutions for businesses of all sizes. Regardless of industry, business owners must adapt daily operations to meet the needs of telecommuting. This [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":1496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-1492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security When Working Remotely Is Vital Because Of Increased Threats<\/title>\n<meta name=\"description\" content=\"Businesses face increased cybersecurity threats when working remotely. Prevent Security situations with proper remote access solutions from IT experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security When Working Remotely Is Vital Because Of Increased Threats\" \/>\n<meta property=\"og:description\" content=\"Businesses face increased cybersecurity threats when working remotely. Prevent Security situations with proper remote access solutions from IT experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T14:09:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-26T06:09:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"Security Measures To Take When Working Remotely\",\"datePublished\":\"2021-08-06T14:09:47+00:00\",\"dateModified\":\"2024-03-26T06:09:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/\",\"name\":\"Security When Working Remotely Is Vital Because Of Increased Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg\",\"datePublished\":\"2021-08-06T14:09:47+00:00\",\"dateModified\":\"2024-03-26T06:09:59+00:00\",\"description\":\"Businesses face increased cybersecurity threats when working remotely. Prevent Security situations with proper remote access solutions from IT experts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg\",\"width\":800,\"height\":400,\"caption\":\"Secure Cell Phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/security-measures-to-take-when-working-remotely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Measures To Take When Working Remotely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security When Working Remotely Is Vital Because Of Increased Threats","description":"Businesses face increased cybersecurity threats when working remotely. Prevent Security situations with proper remote access solutions from IT experts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/","og_locale":"en_US","og_type":"article","og_title":"Security When Working Remotely Is Vital Because Of Increased Threats","og_description":"Businesses face increased cybersecurity threats when working remotely. Prevent Security situations with proper remote access solutions from IT experts.","og_url":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/","og_site_name":"IS&amp;T Blog","article_published_time":"2021-08-06T14:09:47+00:00","article_modified_time":"2024-03-26T06:09:59+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg","type":"image\/jpeg"}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"Security Measures To Take When Working Remotely","datePublished":"2021-08-06T14:09:47+00:00","dateModified":"2024-03-26T06:09:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/"},"wordCount":586,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg","articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/","url":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/","name":"Security When Working Remotely Is Vital Because Of Increased Threats","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg","datePublished":"2021-08-06T14:09:47+00:00","dateModified":"2024-03-26T06:09:59+00:00","description":"Businesses face increased cybersecurity threats when working remotely. Prevent Security situations with proper remote access solutions from IT experts.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#primaryimage","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/08\/SecurityWhenWorkingRemotely1-onmobile-IST.jpg","width":800,"height":400,"caption":"Secure Cell Phone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/security-measures-to-take-when-working-remotely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Measures To Take When Working Remotely"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=1492"}],"version-history":[{"count":17,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1492\/revisions"}],"predecessor-version":[{"id":5930,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1492\/revisions\/5930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media\/1496"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=1492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=1492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=1492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}