Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Working Remotely? Here Are 4 Often-Overlooked Steps That Secure Your Data

By Kenya Parrish-Dixon
July 01, 2020

Most businesses either shut down temporarily or sent all their employees home to telework by mid-March of this year. By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions of Americans logged on to their home networks and personal desktops, laptops, tablets and mobile phones in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage. Many corporations, and law firms in particular, have already suffered breaches. Many are unaware that a breach has even occurred. American industry was not and is still not adequately prepared for this transition. The responsibility to keep corporate and client data safe is shared by the company and the employee.

The private sector could learn a great deal from the federal government about securely managing teleworking employees. The federal government has an extensive telework program run by each agency. The rigor of each program largely depends on how data is classified within that agency. Even with different protocols across agencies, the government overall knows how to securely manage thousands of teleworking employees. If we follow its lead, there are many steps for securing data that can be implemented quickly and inexpensively. Here are four categories of cyber strategies that can be implemented for large-scale teleworking with very little effort.

|

The Three A's: Assets, Antivirus and Additional Protocols

Private sector businesses should learn to follow the federal government's process for telework regarding assets and devices. Federal employees that telework are typically issued a federal asset or device, like a laptop or tablet instead of a desktop. The laptop is given an agency-specific image that includes antivirus software and an approved access portal like Citrix.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access Lawsuit Image

Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.

Fresh Filings Image

Notable recent court filings in entertainment law.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.