7 Remote Security Dos and Don’ts

—Ruth Christensen | 05.20.20

7 Remote Security Dos and Don’ts

Ruth Christensen, 05.20.20

With remote work in full swing, scammers are busier than ever. Which means it’s high time for some remote security dos and don’ts.

Cybercrime is constantly evolving. But as more organizations work remotely, scammers have gone into overdrive. Employees also have more on their minds, which means security best practices can slip through the cracks. 

According to CISO Richard Kaufmann, “Bad guys have the easy job. They can be as creative as they want (and) can attack you through any means necessary.” 

Whew. It’s hard to adapt when your security landscape is constantly shifting. Plus, even the best IT department can’t be 100% effective if employees aren’t security savvy. So, what’s the answer?

Stay one step ahead of the scammers by following these remote security dos and don’ts.



40% of remote employees admit to transferring files between work and personal computers.1

DON’T use personal devices for work without appropriate security protocols in place.

DO follow security policies for company equipment and BYOD, paying special attention to multi-factor authentication and best practices for file sharing.



More than 48% of malicious email attachments are Office files and other common file types.

DON’T assume any email attachment is safe. Period.

DO ignore attachments unless they come from a trusted source. And when you collaborate, share your own attachments in Teams, SharePoint, or via OneDrive.



90% of data breaches come from phishing, with 1.5 M new phishing sites created every month.3

DON’T mindlessly click links or open attachments.

DO look for unknown senders, internal links, urgent requests for personal information, and offers that seem too good to be true. Check validity through Internet searches and report suspicious activity.



Email is responsible for 92% of malware attacks. Websites and apps take second place at 6%.4

DON’T fall for email trickery or put off critical system updates.

DO update your system, browsers, and plug-ins regularly. Additionally, log out of websites after browsing, back up important data, and remove unused or old software.



Over 81% of ransomware attacks occur at enterprises, with email as the main distribution method.5

DON’T pay the ransom, no matter how desperate you feel.

DO create secure backups so you can always access critical files. If attacked, alert IT immediately.



Tech support scammers have convinced 1 in 5 consumers to continue with a fraudulent interaction.6

DON’T respond to unsolicited tech advice, even if the company looks reputable.

DO follow-up on legitimate websites where you can chat with an authorized tech support representative. Be suspicious of unsolicited phone calls, pop-up windows, or website redirects.



70% of employees in the U.S. lack a basic understanding of security best practices.7

DON’T assume that employees don’t have a role to play in improving your organization’s security.

DO teach your employees to be savvy about cyber security issues. Use a platform like BrainStorm QuickHelp™ to automate your communications, poll your users, and build security skills.

Want to change the way your users think about security? Talk to a BrainStorm change expert.

BrainStorm transforms organizations by using technology to empower people and activate change. Need more information about working securely? Read Microsoft Teams – How Secure is it Really? A Rundown.



  1. Heimdal | Remote work cyber security
  2. CSO Online | 8 mobile security threats
  3. Retruster | 2019 phishing and email fraud statistics
  4. IANS Research | Malware data
  5. Symantec | 2019 Internet security threat report
  6. Microsoft | 2018 scam research
  7. Hashed Out | 2019 cyber security statistics

Ruth Christensen
When Ruth first arrived on the scene at BrainStorm, she made an impression with her homemade cheesecake bars. Besides baking, Ruth loves to serve up delicious marketing content, read classic novels, and shop for wild-looking shoes.

How to Work from Your Phone: Mobile Productivity on the Go

Jessica Roylance, 01.20.21

Back in the old days, office work only happened at the office. Now it seems like we’re all working from home or on the go—which requires thinking.

Read More

How to Record a PowerPoint Presentation to Share Later

Jessica Roylance, 01.13.21

We’ve all been there when remote presentations flop.

Read More

Managing Remote Teams: 10 Tips and Best Practices

Jessica Roylance, 01.06.21

The remote management challenge  

Read More

Online Learning Solutions: Finding the Perfect Fit

Jessica Roylance, 11.03.20

These days, organizations have their hands full helping employees work efficiently. No wonder they turn to online learning solutions to onboard new.

Read More