Security Awareness

How to prevent working from home becoming a security risk

Information Security
Security Awareness
Privacy

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Working from home is the new standard. Just log in from the kitchen table, open documents on a private device, or have a Teams meeting while the kids are watching a movie in the background, it probably happens sometimes. Many organizations are not sure how to address the risks of working remotely. Let's say an employee works from home via their private Wi-Fi without a VPN. The connection is barely secure. Or sensitive files accidentally end up in a personal cloud folder, which is also synced to a family member's tablet. The chance that confidential data will leak out is then suddenly very real.

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This article was last updated on
23.03.2026
Written by
Kilian
Houthuijzen
Commercial Manager & Partner

What does “ISO 27001 A.6.7: remote work” require from your organization?

A.6.7 requires organizations to take measures to securely access information outside the office. This also applies to working from home, flexible working, teleworking or working from a coffee shop (remote). Think about:

🛡️ Technique that helps

  • Use a VPN or virtual desktop environment
  • Mandatory 2FA (Two-Factor Authentication)
  • Don't store files locally on private devices
  • Protect devices with firewall, anti-malware, and endpoint protection (EDR)

📱 Device Management

  • Use Mobile Device Management (MDM) for central control
  • Enable automatic screen lock and inactivity timers
  • Encrypt laptops with BitLocker or FileVault
  • Make sure you can remotely wipe or block devices in case of theft

🏠 Physical home office

  • Don't leave documents lying around
  • Use lockable cabinets
  • Restrict access for roommates or visitors

📘 Organizational policy

  • Set up a clear “remote work policy”
  • Control who has access to what
  • Provide an incident procedure
  • Train employees to work safely remotely

🧠 Awareness

Even with the best tools, things go wrong when employees don't know what they shouldn't do. For example:

  • Share a file with a personal Google Drive account
  • Working on the family laptop “because business is slow”
  • Forget to lock the screen with roommates in the neighborhood

Awareness is not a one-off training, but something you should keep alive:

  • Short microlearnings (Guardey) or e-learning modules
  • Campaigns around current threats (such as phishing)
  • Concrete rules of conduct: “No work via public Wi-Fi without a VPN”

Make it safe and workable

No one is waiting for redundant rules or difficult hassles. Fortunately, working safely remotely doesn't have to be complicated. A well-designed system makes it easy and safe for employees to do their work. Think about:

✔️ Automatic screen lock

For example, if an employee gets a coffee, the screen locks automatically after 5 minutes. This prevents someone else from secretly watching.

✔️ Central logging and monitoring

For example, if someone logs in from abroad at 3:00 a.m., IT automatically gets a notification. In this way, suspicious actions can be investigated quickly.

✔️ Can remotely wipe devices in case of loss

For example, if an employee loses their laptop on the train, IT can remotely wipe the device. This way, company data remains protected.

✔️ Regular awareness training courses

For example, employees receive short training and a phishing test every quarter. This way, they stay alert to digital threats.

✔️ Working with pre-approved tools and storage locations

For example, files may only be stored in OneDrive or SharePoint. Tools like Dropbox or USB sticks are blocked.

What can you do now?

✅ Establish a Remote Work Security Policy

✅ Let your employees know what they can and cannot do

✅ Use technical tools to restrict and monitor access

Do you want advice about this or take a look at your policy? Schedule an informal consultation, we are happy to think along with you!

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

How many people participate?

Request now

Thanks!
Oops! The form could not be submitted. Please try again.

More resources

News

Dag stoffige consultancy, hallo Next-Gen C!

thru
Ruben
Blog
Partners

Our Trusted MSPs

thru
Jurre
Blog
Implementation

What documents do you need for ISO 27001 proof?

thru
Mathijs
Kennisartikel