Skip to main content

Remote Work Security Assessment

Audit Icon

Companies are adopting remote work options for their employees now more than ever. According to a recent survey, just under half of employees who work remotely reported that they receive data security training. With confidential company and customer data being a valuable asset to your organization, and something hackers are after, this is a big red flag. 

While remote work has many benefits to both the company and the employees, it can be a serious security threat the requires a thorough assessment of the risks involved while ensuring that critical business functions and activities are not jeopardized. To help mitigate the risks of employees working remotely, accessing sensitive data, and connecting to the corporate network, SBS developed the Remote Work Security Assessment. This assessment provides peace of mind in knowing that work can get done remotely without compromising information security.

​Working with SBS to review your remote work program will provide you with the expertise, insight, tools, and resources you need to evaluate the risks and controls related to your people, processes, and technology. The Remote Work Security Assessment reviews both the corporate environment, as well as home network requirements and can include:

Home User Network Review

  • External Vulnerability Assessment
  • Secure Wi-Fi / Connections
  • System Hardening requirements for computing and networking devices
  • Requirements:
    • Password 
    • Multifactor
    • Encryption
    • Antivirus
  • Data Backups
  • Data Storage Restrictions
  • Patch Management Capabilities
  • Host IPS / Network IPS (HIPS/NIPS)
  • Employee Required to Review and Accept Organization Remote Working Policies

Corporate Network Review

  • External Penetration Test
  • Firewall Configuration Review
  • Remote Access Security Review
  • Phishing Assessment
  • Documented Remote Work Policies and Procedures
    • Acceptable Use Policy
    • Remote Working Policy
    • Bring Your Own Device Policy
  • Risk Assessments on Remote Working Environment
  • Review of IT Strategic Plan
  • Secured Remote Connections (RDP, VPN, etc.)
  • Multifactor Requirements
  • Remote Tool Inventory
  • Mobile Device Management Solution
  • Logging and Monitoring
  • Review Employee Training and Education
  • Review Remote User Access Approvals





Free Download

Free Download!
Securing Remote Work Checklist

If your organization is looking into how to set up SECURE remote working capabilities, this handy guide will get you started. The checklist includes: Pros and Cons of Remote Work, a Getting Started Checklist, and Suggested Controls Focused on People, Process, and Technology

Get Your Checklist!