{"id":3722,"date":"2020-07-21T09:00:13","date_gmt":"2020-07-21T14:00:13","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3722"},"modified":"2020-07-21T09:00:13","modified_gmt":"2020-07-21T14:00:13","slug":"what-should-security-guidelines-for-remote-workers-include","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/","title":{"rendered":"What Should Security Guidelines for Remote Workers Include?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-3723\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-300x200.jpg\" alt=\"A dark-haired woman wearing glasses works on a laptop that displays a glowing light blue shield on the screen to symbolize cybersecurity.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-1024x682.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-768x511.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-1536x1022.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-2048x1363.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>With cases of COVID-19 surging across the U.S. and the future looking uncertain, many American workers continue to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/remote-work-resource-roundup-9-blog-entries-for-business-leaders-navigating-the-new-normal\/\" target=\"_blank\" rel=\"noopener noreferrer\">do their jobs from home<\/a>. While these remote workers are reducing their chances of contracting and spreading the novel coronavirus by not commuting back and forth to the office, many of them face elevated risks in another area: <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity<\/a>.<\/p>\n<h2>Remote Workers in the U.S. Lack Security Guidance<\/h2>\n<p>More than half of Americans who are newly working from home because of the pandemic are doing so without awareness of any new policies for password management, data handling and other aspects of information security, according to the <a href=\"https:\/\/newsroom.ibm.com\/2020-06-22-IBM-Security-Study-Finds-Employees-New-to-Working-from-Home-Pose-Security-Risk#:~:text=IBM%20Security%20Study%20Finds%20Employees%20New%20to%20Working%20from%20Home%20Pose%20Security%20Risk,-X%2DForce%20Red&amp;text=The%20study%20shows%20more%20than,policies%20to%20help%20guide%20them.\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">IBM Security Work from Home Survey<\/a>. Here are a few more findings from the survey:<\/p>\n<ul>\n<li>More than 50 percent are using their personal computers for work, and 61 percent say their employers haven\u2019t given them tools to safeguard those devices.<\/li>\n<li>66 percent haven\u2019t received new guidance on password management, and 35 percent are reusing passwords.<\/li>\n<li>More than 50 percent haven\u2019t gotten new guidance on dealing with highly regulated personally identifiable information (PII) while working remote.<\/li>\n<\/ul>\n<p>This is a recipe for disaster and widespread data breaches, given that malicious actors have sought to exploit the public health crisis with COVID-19-themed scams, according to <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-099a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">an alert<\/a> issued a few months ago by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom\u2019s National Cyber Security Centre (NCSC).<\/p>\n<p>Additionally, the CISA and NCSC have noted the shift to remote work infrastructure has created new points of vulnerability that cybercriminals can use to gain access to sensitive data. At a tumultuous time when employees need IT security guidance more than ever, many of them don\u2019t have it.<\/p>\n<p>If you haven\u2019t issued up-to-date security guidelines for remote workers, now is the time to do so. Here are some essential factors and solutions to include in your guidelines:<\/p>\n<h2>1. Password policies.<\/h2>\n<p>More than 80 percent of breaches caused by hacking involve brute force or the use of lost or stolen credentials, according to <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Verizon\u2019s 2020 Data Breach Investigations Report<\/a>. It\u2019s vital to instruct remote workers on <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/4-key-reasons-to-use-a-password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">best practices for passwords<\/a>, including instructions for creating strong ones, not sharing them and changing them regularly.<\/p>\n<h2>2. VPN usage.<\/h2>\n<p>You can significantly lower your organization\u2019s data breach risk level by telling all remote workers to use a <a href=\"https:\/\/www.stratospherenetworks.com\/secure-vpn.html\" target=\"_blank\" rel=\"noopener noreferrer\">secure VPN<\/a> to access your company LAN. Ensure the VPN stays up-to-date to avoid breaches, according to the CISO article \u201c<a href=\"https:\/\/www.csoonline.com\/article\/3531963\/8-key-security-considerations-for-protecting-remote-workers.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">8 key security considerations for protecting remote workers<\/a>.\u201d<\/p>\n<p>If you want an additional layer of security beyond what a VPN offers, you can leverage our <a href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"noopener noreferrer\">Office Anywhere solution<\/a>, a zero-trust framework with a Secure Access Service Edge (SASE). The recent migration to remote work has changed how people think about VPNs, which give end users access to everything on your network. Office Anywhere only grants access to the specific apps end users need to complete their work, based on their device\u2019s security checks, access requirements, and a determination process. This is ideal for companies that now have staff members working remote with personal devices.<\/p>\n<h2>3. Multi-factor authentication.<\/h2>\n<p>Implementing <a href=\"https:\/\/www.stratospherenetworks.com\/two-factor-authentication.html\" target=\"_blank\" rel=\"noopener noreferrer\">two-factor or multi-factor authentication<\/a> for all your team members\u2019 work-related accounts adds an extra layer of protection and can prevent a breach even if someone\u2019s credentials get stolen.<\/p>\n<h2>4. Anti-virus software.<\/h2>\n<p>You should maintain current anti-virus software on all devices used for work to lower the chances of malware infection, according to the Kaspersky Daily blog entry \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/remote-work-security\/34258\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Remote working safety and security<\/a>.\u201d<\/p>\n<h2>5. Device locking and sharing.<\/h2>\n<p>Ensure that your team members know to lock any devices they\u2019re using for work before leaving them unattended. Additionally, instruct them not to share company-issued devices or personal devices with work-related data on them with friends or family members, which is a high-risk habit, according to <a href=\"https:\/\/resources.infosecinstitute.com\/category\/enterprise\/securityawareness\/security-awareness-roles\/security-awareness-issues-for-remote-workers\/#gref\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external external_icon\">Infosec<\/a>.<\/p>\n<h2>6. Use of corporate apps only for work.<\/h2>\n<p>Instruct people working from home to not use personal apps (e.g., their non-professional Gmail account) for work purposes. Because your IT team doesn\u2019t have control over those apps, they can\u2019t ensure data security.<\/p>\n<p>On top of issuing robust security guidelines for remote workers, you should also conduct <a href=\"https:\/\/www.stratospherenetworks.com\/employee-security-awareness.html\" target=\"_blank\" rel=\"noopener noreferrer\">employee security awareness training<\/a> on a regular basis to make sure your staff is familiar with your company policies.<\/p>\n<p>Of course, to achieve the best possible security posture, you should also implement reliable cybersecurity solutions, such as the following:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"noopener noreferrer\">Endpoint and network Managed Detection and Response (MDR)<\/a><\/li>\n<li><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-every-business-should-use-device-encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">Device encryption<\/a><\/li>\n<li><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/are-your-teams-smartphones-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Device Management<\/a><\/li>\n<\/ul>\n<p>If you\u2019d like to learn more about how to establish security guidelines for remote workers, our IT security analysts are available to assist you. We offer a wide range of advanced cybersecurity services and solutions and have considerable experience helping businesses establish secure remote work arrangements.<\/p>\n<p>For more information, give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener noreferrer\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cases of COVID-19 surging across the U.S. and the future looking uncertain, many American workers continue to do their jobs from home. While these remote workers are reducing their chances of contracting and spreading the novel coronavirus by not &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-3722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Security Guidelines for Remote Workers: What to Include<\/title>\n<meta name=\"description\" content=\"Here\u2019s what you should consider when setting security guidelines for remote workers to safeguard sensitive data and avoid data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Guidelines for Remote Workers: What to Include\" \/>\n<meta property=\"og:description\" content=\"Here\u2019s what you should consider when setting security guidelines for remote workers to safeguard sensitive data and avoid data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-21T14:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"What Should Security Guidelines for Remote Workers Include?\",\"datePublished\":\"2020-07-21T14:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\"},\"wordCount\":812,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\",\"name\":\"Security Guidelines for Remote Workers: What to Include\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg\",\"datePublished\":\"2020-07-21T14:00:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Here\u2019s what you should consider when setting security guidelines for remote workers to safeguard sensitive data and avoid data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg\",\"width\":2123,\"height\":1413,\"caption\":\"A dark-haired woman wearing glasses works on a laptop that displays a glowing light blue shield on the screen to symbolize cybersecurity.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Should Security Guidelines for Remote Workers Include?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"Security Guidelines for Remote Workers: What to Include","description":"Here\u2019s what you should consider when setting security guidelines for remote workers to safeguard sensitive data and avoid data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/","og_locale":"en_US","og_type":"article","og_title":"Security Guidelines for Remote Workers: What to Include","og_description":"Here\u2019s what you should consider when setting security guidelines for remote workers to safeguard sensitive data and avoid data breaches.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-07-21T14:00:13+00:00","og_image":[{"width":2123,"height":1413,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"What Should Security Guidelines for Remote Workers Include?","datePublished":"2020-07-21T14:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/"},"wordCount":812,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/","name":"Security Guidelines for Remote Workers: What to Include","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg","datePublished":"2020-07-21T14:00:13+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Here\u2019s what you should consider when setting security guidelines for remote workers to safeguard sensitive data and avoid data breaches.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/security-guidelines-for-remote-workers.jpg","width":2123,"height":1413,"caption":"A dark-haired woman wearing glasses works on a laptop that displays a glowing light blue shield on the screen to symbolize cybersecurity."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-should-security-guidelines-for-remote-workers-include\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Should Security Guidelines for Remote Workers Include?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3722"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3722\/revisions"}],"predecessor-version":[{"id":3726,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3722\/revisions\/3726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3723"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}