{"id":7236,"date":"2020-07-06T15:32:25","date_gmt":"2020-07-06T19:32:25","guid":{"rendered":"https:\/\/www.itadsummit.com\/?page_id=7236"},"modified":"2020-07-07T12:42:38","modified_gmt":"2020-07-07T16:42:38","slug":"itad-blog-5-unique-data-security-challenges-that-remote-workers-face","status":"publish","type":"page","link":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/","title":{"rendered":"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face"},"content":{"rendered":"<h1>\n\t\tITAD Blog\n\t<\/h1>\n<h6>\n\t\t5 Unique Data Security Challenges That Remote Workers Face\n\t<\/h6>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg\" alt=\"digital\" itemprop=\"image\"  \/>\n\t<h1>ITAD Blog<\/h1>\n<h3>5 UNIQUE DATA SECURITY CHALLENGES THAT REMOTE WORKERS FACE<\/h3>\n\t<p>In 2018, Global Workplace Analytics reports that 5 million U.S. employees worked at home at least part-time. When the COVID pandemic hit, surveys found that 88% of workers who could work from home started working from home at least one day a week. The same survey also found that 68% of those workers felt they were working just as well at home as they do in an office setting.<\/p>\n<p>Working remotely has proven to many companies that working from home can save money and make employees happier. There are lots of positives, but you cannot overlook the negatives. The good news is that with some careful considering, the negatives to working from home are easily overcome. Data security is the main concern. These are the five data security challenges remote workers need to address.<\/p>\n<h3><strong>Weak Security at Home<\/strong><\/h3>\n<p>How are your home workers accessing the internet? Do they use the same security measures you use in the office? Chances are they\u2019re using the firewall that comes with their operating system, and that\u2019s if they even bother to use one at all. They may have a virus\/malware security suite, but you have no idea if they keep it updated and run it constantly.<\/p>\n<p>They\u2019ll have cell phones connected to their home networks. Are those equipped with security software? How about all the smart devices a home has like smart speakers, lighting, security cameras, etc? If a hacker wanted to get into a private home, it may be a lot easier to do so than it would be at your office. To prevent that, you need to hold an open discussion. It may be in your best interest to have your IT department or a security specialist go to each home office and look at the set-up.<\/p>\n<h3><strong>Poor Backup and Recovery<\/strong><\/h3>\n<p>You have workers using their home laptops to connect to your work servers to get files. Those same employees use their home laptops for shopping, watching videos after work hours, or reading personal emails. One of them falls for a scam in some way. It might be a bogus link in an email, malware found in an online ad, or one of the dozens of other ways worms, malware, spyware, and other critical issues make it onto a computer.<\/p>\n<p>The work the employee completed is now corrupt or lost. If anything was also saved to your work servers, your servers are at risk. Not only does your security team have a job to do now to save files, if that\u2019s even possible, but your employee has to start from scratch. If files are missing or corrupt, dozens of hours of work are lost. It\u2019s frustrating, but it can also be incredibly costly. You may miss deadlines and lose customers. If any confidential information was stolen in a breach, you may face fines and lawsuits. Can you afford that?<\/p>\n<h3><strong>DOS and DDOS Attacks<\/strong><\/h3>\n<p>On June 15th, fears of a DDOS attack hitting the U.S. hit the media. The hacktivist group Anonymous said a major DDOS attack was happening. It made sense to many as AT&amp;T, Comcast, T-Mobile, and other services or companies went down. Cybersecurity experts say it didn\u2019t happen, but T-Mobile was upgrading networks, which caused several issues.<\/p>\n<p>It is worth considering how this data security issue could cause problems for remote workers. Loss of productivity is the main concern, but it could also lead to a loss of private information. If a remote worker has no internet or phone service, that worker\u2019s productivity comes to a screeching halt. Business owners need to make sure networks are protected as best they can.<\/p>\n<h3><strong>Lack of Training or Guidance in Best Practices<\/strong><\/h3>\n<p>Companies need to offer guidance to their employees that cover security training and the best practices to follow. These measures need to be used in the office and within home offices. If your company doesn\u2019t have one, it\u2019s important to get one in place and make sure employees understand and follow the guidelines.<\/p>\n<p>You need to cover several things in a guide to working at home. You need a detailed plan that informs employees of the security software they need to use. You need to address what they should do with electronic devices that no longer work and must be recycled. You have to talk about firewalls, external storage, where to store electronics when they\u2019re not being used, and who to inform if there are problems.<\/p>\n<p>At a bare minimum, you need to make sure your employees have firewalls in place, use secure passwords, and use a VPN when accessing company servers remotely. Employees shouldn\u2019t send business attachments and confidential information through a personal email account. They shouldn\u2019t store company documents on their home computer. They need to know how to send encrypted messages to you and their co-workers.<\/p>\n<p>Your workers need to have security software that\u2019s recommended by your company and that it\u2019s set to update definitions daily and run scans as often as your IT and security team recommend. If they\u2019re not tech-savvy, teach them. They need to make sure work laptops have passwords to prevent access and that the laptops are stored in a safe place when not in use. A fireproof safe is ideal. Address who is allowed to touch work laptops. You probably don\u2019t want them allowing a spouse or child to use the work laptop while they\u2019re away from their desk. It may seem absurd to have to write out commonsense rules, but<\/p>\n<h3><strong>Use of Recycled Equipment or Not Knowing How to E-Recycle Properly<\/strong><\/h3>\n<p>Are you expecting your employees to use their home computers to remotely access work servers? Are they bringing home some of their office equipment and storing it in their home? If they\u2019re using their computers, you need to consider where those laptops or desktops came from and where they\u2019ll go when they\u2019ve outlived their usefulness. The same is true of any copiers and printers they\u2019ll be using at home. While most refurbished or used office equipment is free of viruses, malware, and other security issues, it comes down to how data was destroyed. Some companies take shortcuts that may not make the electronic devices as safe as you\u2019d want them to be. When it\u2019s time to recycle them, you don\u2019t want files that are on a wiped hard drive to be recovered and fall into the wrong hands.<\/p>\n<p>&nbsp;<\/p>\n<p>Author: ERI<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"post-excerpt\" class=\"post-excerpt\">ITAD Blog 5 Unique Data Security Challenges That Remote Workers Face ITAD&hellip;<\/p>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\">Continue reading<span class=\"screen-reader-text\"> &#8220;ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face&#8221;<\/span>&hellip;<\/a><\/div>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\">Continue reading<span class=\"screen-reader-text\"> \"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face\"<\/span>&hellip;<\/a><\/div>","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7236","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face - ITAD Summit - Las Vegas - August 2026 - Conference<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face - ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:description\" content=\"ITAD Blog 5 Unique Data Security Challenges That Remote Workers Face ITAD&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T16:42:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\",\"url\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\",\"name\":\"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face - ITAD Summit - Las Vegas - August 2026 - Conference\",\"isPartOf\":{\"@id\":\"https:\/\/www.itadsummit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg\",\"datePublished\":\"2020-07-06T19:32:25+00:00\",\"dateModified\":\"2020-07-07T16:42:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#primaryimage\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.itadsummit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itadsummit.com\/#website\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"description\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"publisher\":{\"@id\":\"https:\/\/www.itadsummit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itadsummit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.itadsummit.com\/#organization\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"width\":744,\"height\":289,\"caption\":\"ITAD Summit - Las Vegas - August 2026 - Conference\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face - ITAD Summit - Las Vegas - August 2026 - Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/","og_locale":"en_US","og_type":"article","og_title":"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face - ITAD Summit - Las Vegas - August 2026 - Conference","og_description":"ITAD Blog 5 Unique Data Security Challenges That Remote Workers Face ITAD&hellip;","og_url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/","og_site_name":"ITAD Summit - Las Vegas - August 2026 - Conference","article_modified_time":"2020-07-07T16:42:38+00:00","og_image":[{"url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/","url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/","name":"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face - ITAD Summit - Las Vegas - August 2026 - Conference","isPartOf":{"@id":"https:\/\/www.itadsummit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#primaryimage"},"image":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg","datePublished":"2020-07-06T19:32:25+00:00","dateModified":"2020-07-07T16:42:38+00:00","breadcrumb":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#primaryimage","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/digital-circle.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-5-unique-data-security-challenges-that-remote-workers-face\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itadsummit.com\/"},{"@type":"ListItem","position":2,"name":"ITAD Blog: 5 Unique Data Security Challenges That Remote Workers Face"}]},{"@type":"WebSite","@id":"https:\/\/www.itadsummit.com\/#website","url":"https:\/\/www.itadsummit.com\/","name":"ITAD Summit - Las Vegas - August 2026 - Conference","description":"ITAD Summit - Las Vegas - August 2026 - Conference","publisher":{"@id":"https:\/\/www.itadsummit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itadsummit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itadsummit.com\/#organization","name":"ITAD Summit - Las Vegas - August 2026 - Conference","url":"https:\/\/www.itadsummit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","width":744,"height":289,"caption":"ITAD Summit - Las Vegas - August 2026 - Conference"},"image":{"@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7236"}],"collection":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/comments?post=7236"}],"version-history":[{"count":2,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7236\/revisions"}],"predecessor-version":[{"id":7245,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7236\/revisions\/7245"}],"wp:attachment":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/media?parent=7236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}