HOffice ProServ

Merging cybersecurity best practices with today's flexible home office staff
In the traditional office space, Cybersecurity is often viewed as a "must-do" responsibility and its associated practices tend to be left at work by employees. With instant access to business resources from virtually anywhere in the world, employees no longer leave work at physical office spaces. Instead, work has become blended alongside personal life schedules and devices. Understanding that the work-from-home culture is a commonly acceptable part of workplace flexibility, we want to get businesses and people to understand the importance of working with acceptable security baselines that can be practiced effectively across both lifestyles.
Cybersecurity: Blending the Office and Home


Information Security and Cybersecurity: What's the difference?
(Note: These are general descriptions)
Information security is driven by the value of information resources to the business and regulatory requirements regardless of the medium that the information resides on or in. Information security requirements directly influence physical, administrative, and technical security programs.
Information and the way information must be protected is governed by different variables including internal policies based on the importance to the business and external industry, local, state, federal, and national regulatory and compliance requirements.
A subset of, yet arguably equal to, Information Security, Cybersecurity is primarily focused on the protection of information systems (e.g., workstations, servers, infrastructure, data, services, etc.) and their associated roles in presenting, storing, processing, and transmitting information. The Confidentiality, Integrity, and Availability controls applied are directly influenced by the information security requirements defined by the organization.






1.Business Requirements
2. Building an IS Program
3. Effective Communication
Incorporating HOffice in the Corporate Information Security Program
Arguably one of the greatest challenges to any Information Security (IS) program is introducing security controls that are not deemed too "intrusive" or a "hindrance" by the end user while still being able to maintain effective management and oversight of resources.
​
HOffice ProServ wants to provide ideas on how to integrate an effective IS program that can likely be accepted and practiced by home office professionals.
