COVID-19 Remote Work Security Checklist

Summarise on:
Charu Pel

Charu Pel

6 min Read

COVID-19 Quick Remote Work Cyber Security Checklist

Direct answer: Organizations can reduce remote-work cyber risk quickly by running a role-based checklist for leadership, employees, and directors that covers communication, endpoint controls, incident handling, and phishing preparedness.

The earlier article "Coronavirus (COVID-19) Guidance for Small and Large Businesses" described business-response steps. As remote work expanded globally, cybercriminals increased malicious email and VPN-targeting activity.

The e-InnoSec team published this quick checklist to help organizations evaluate remote-work readiness and identify areas that need immediate security attention.

The checklist is split into three parts based on roles and responsibilities in the organization.

What should senior management check for remote work security?

#QuestionsYesNo
1Is the CEO present in online tools, channels, communicating proactively and engaging in timely conversations?  
2Has the management explained in writing what the company is trying to accomplish and has a vision that can help employees rally behind?  
3Has management addressed the issues raised by employees?  
4Is management courteous, compassionate, and authentic across channels?  
5Does the company have online expressions for your culture? The virtual water cooler where high fives, celebrations, gossip, community, family, personal interest, happy emojis, etc. can be shared.  
6Does the company have the right digital tools to facilitate communication? (E.g., Text messaging, Slack, email, wikis, hangout, video conferences, etc.)  
7Do the company have established security policies and guidelines for remote work?  

What should employees check for remote work cybersecurity?

#QuestionsYesNo
1Is your Wi-Fi connection secure? Can you reach out to the support team to verify and test?  
2Is anti-virus or any updates/patches applied timely to the computer without delay?  
3Do you back-up periodically in addition to auto backup runs?  
4Do you lock your screen while away and protect them from kids?  
5Did you check with your support team that encryption is in place and working?  
6Are you familiar with applicable security guidelines, plans, and policies?  
7Are you aware that the work computer and other devices must not be shared?  

What should directors check for remote work cybersecurity?

#QuestionsYesNo
1Do you have adequate support staff to address the questions from remote workers and resolve the issues in time?  
2Do you have the ability to push updates, patches, etc. and enforce timely implementation?  
3Can you provide virtual solutions, digital signature, and approval workflows?  
4Do you have clear procedures for employees to follow in case of a security incident?  
5Can you limit access to sensitive data where it makes sense?  
6Do you have a data breach and incident response plan to manage incidents?  
7Did you send a reminder to employees as to what information needs to be protected? (E.g., confidential, sensitive business information, trade secrets, intellectual property, private employee information, work product, customer information, and other personal information that identifies a person.)  
8Have you trained employees on how to detect and/or handle phishing attacks and other forms of social engineering attacks?  
9Do you have a policy in place to prohibit access to company information systems while on public wi-fi?  
10Do you have solutions in place to manage and secure mobile devices and applications?  
11Are you communicating with employees about coronavirus-themed phishing emails?  

What supporting notes and example phishing email are included?

The checklist references guidance and articles from Fast Company, ENISA, JDSPURA, BBC, CNBC, and other sources.

The source post also includes a phishing email example to reinforce awareness.

Coronavirus phishing email example

Key Takeaways

  • Use role-based accountability for leaders, employees, and directors during remote-work operations.
  • Prioritize secure connectivity, patching, endpoint hygiene, backup discipline, and device-handling controls.
  • Define clear security incident procedures and escalation responsibilities.
  • Continuously communicate phishing trends and train teams with real examples.

GRC Insights That Matter

Exclusive updates on governance, risk, compliance, privacy, and audits — straight from industry experts.

Related Resources

Related Posts

COVID 19, Remote Work, and Cyber Security
Cybersecurity
COVID 19, Remote Work, and Cyber Security

A role-based remote work cybersecurity checklist for senior management, employees, and directors, including phishing awareness and incident response readiness.

Read More
Senior Mgt & Employee Responsibilities - COVID 19
Cybersecurity
Senior Mgt & Employee Responsibilities - COVID 19

A practical remote-work cybersecurity checklist defining senior management, employee, and director responsibilities during COVID-19 operations.

Read More
COVID -19 Quick Check For Fraud
Cybersecurity
COVID -19 Quick Check For Fraud

COVID-19 quick fraud check using source data on internal and external fraud schemes, corruption risks, and practical review steps.

Read More
background-line