Cybersecurity Cloud & Data

Cybersecuring Work From Home: How to start ensuring data security in an organization with WFH

What good practices should organizations follow to ensure the security of their data, especially since now that Work from Home (WFH) is becoming a norm?

Cyber threats are increasing on a daily basis. No one knows who the next victim of a data breach will be. Meanwhile, with social distancing and WFH becoming the only way businesses can function without hiccups now, how can organizations secure their data? Where do they even start?


Read more: Cyber trigger: Fraudsters leverage remote working, COVID-19 to give sleepless nights


However, secure they must, because a cyber criminal is just lurking in the dark waiting for an organization to let it´s guard down.

The Tech Panda asked a few organization leaders how to go about protecting an organization in the current scenario of cyber landscape. The following practices are imperative in order to ensure a better security posture for every organization.

To Secure WFH Secure Mobiles

WFH models have increased the use of mobile phones across the globe. With people working for close to ten hours a day, and the lines between personal and professional lives blurring, mobile activities are only going to increase. Emails, messages, chats, online transactions, there is literally no limit to what one can achieve from their mobile devices.

Securing mobile applications becomes paramount

“Hence, securing mobile applications becomes paramount. Malware, phishing attacks, and data breaches are some common issues that need immediate attention,” says Govindraj Basatwar, Head of Global Business for  INKA Entworks.

Secure Home Routers, Separate Personal from Official

“A lot of small things would go a long way,” says Raj N, Founder of fintech startups Zaggle and ZIK ZUK.

He advises that organizations can start by securing home routers and separating personal and official devices. They can then encrypt devices by using tools like BitLocker for Windows and FileVault for Mac OS.

A lot of small things would go a long way

BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes.

FileVault is a disk encryption program in Mac OS X 10.3 and later. It performs on-the-fly encryption with volumes on Mac computers.

Organizations should also keep all OS and software patches up-to-date, ensuring antivirus is running and updated, using strong passwords, enabling remote wipe option and using VPN to connect to the office network.

Zero Trust Models

With WFH, all data usage and access have been scattered, increasing the perimeter of area that needs to be secured. In such a scenario, says Sandip Kumar Panda, Co-founder and CEO at InstaSafe, Zero Trust measures can make things easier by providing a single solution for all accesses.

With WFH, all data usage and access have been scattered, increasing the perimeter of area that needs to be secured

“Push your IT teams to operationalize modern security technologies and models like Zero Trust to protect against network-based attacks,” he says.

All Round View of Access Policies

Organizations can start by focusing on detailed risk analysis through threat-modeling exercises, which can look for warnings and signs of data leaks, infrastructure exposure, scams, etc.

Carrying out a complete digital asset inventory of the organization is a good starting point

Carrying out a complete digital asset inventory of the organization is a good starting point. This means that security teams should have an all-round view of access policies, and these resources should go through regular audits to ensure that all the known vulnerabilities are patched.

“Validate every configuration that has been put in place by your team. Carry out an audit of all your traffic flows to identify vulnerabilities,” says Panda.

Investment in Cybersecurity Education

Upskilling in cybersecurity skills is an indispensable need for organizations today, says Panda. Companies need to realize that their hierarchy is such that the lower tiers of employees being exposed to digital assets are often not well equipped to handle them, and as such, should undergo training with respect to securing their devices and enabling secure access.

Human vulnerabilities are an element of risk that cannot be avoided, no matter how robust your security setup is. It may only be countered through education

“Simply put, human vulnerabilities are an element of risk that cannot be avoided, no matter how robust your security setup is. It may only be countered through education,” he says.

Go Neoteric

Apart from the above, organizations can tighten application permissions, work further on data safeguarding mechanisms, and devise certificate pinning strategies. Enforcing session logouts, applying multi-factor authentication, and ensuring a limit on password saving practices also gains importance in the current WFH scenario.


Read more: Fintech must pull up its socks in the face of cyber threats & imminent data breaches


Companies and governments need to upgrade their security setups and adopt neoteric technologies that are built for the modern network as remote working takes over in a new work environment.

Navanwita Bora Sachdev

Navanwita is the editor of The Tech Panda who also frequently publishes stories in news outlets such as The Indian Express, Entrepreneur India, and The Business Standard

Recent Posts

Is AI Hitting a Plateau? The Scaling Debate OpenAI Prefers to Avoid

I think OpenAI is not being honest about the diminishing returns of scaling AI with…

13 hours ago

PayalGaming becomes India’s first female gamer to win an international award

S8UL Esports, the Indian esports and gaming content organisation, won the ‘Mobile Organisation of the…

21 hours ago

Funding alert: Tech startups that raked in moolah this month

The Tech Panda takes a look at recent funding events in the tech ecosystem, seeking…

2 days ago

Colgate launches AI-powered personalized dental screenings

Colgate-Palmolive (India) Limited, the oral care brand, launched its Oral Health Movement. The AI-enabled initiative…

2 days ago

The role of ASR in voice bots: Revolutionizing customer interaction through real-time recognition

This fast-paced business world belongs to the forward thinking organisations that prioritise innovation and fully…

3 days ago

Disrupting Fintech: How product studios are transforming financial services

In the rapidly evolving financial technology landscape, innovative product studios are emerging as powerful catalysts…

1 week ago