top of page

Cybersecurity: Blending the Office and Home

In the traditional office space, Cybersecurity is often viewed as a "must-do" responsibility and its associated practices tend to be left at work by employees.  With instant access to business resources from virtually anywhere in the world, employees no longer leave work at physical office spaces. Instead, work has become blended alongside personal life schedules and devices.  Understanding that the work-from-home culture is a commonly acceptable part of workplace flexibility, we want to get businesses and people to understand the importance of working with acceptable security baselines that can be practiced effectively across both lifestyles.

Image by Sean Pollock
Image by Wynand van Poortvliet

Information Security and Cybersecurity: What's the difference?

(Note: These are general descriptions)

Information Security

Cyber in the office

Information security is driven by the designated value of information to the business and regulatory requirements regardless of the medium that the information resides on or in. Information security requirements must directly influence physical, administrative, and technical security programs.

 

Information and the way information must be protected is governed by different variables including internal policies based on the importance to the business and external industry, local, state, federal, and national regulatory and compliance requirements.

Cybersecurity

Cyber in the home

A subset of, yet arguably equal to, Information Security, Cybersecurity is primarily focused on the protection of information systems (e.g., workstations, servers, infrastructure, data, services, etc.) and their associated roles in  presenting, storing, processing, and transmitting information.

 

Confidentiality, Integrity, and Availability controls applied are directly influenced by the information security requirements defined by the organization.

Incorporating HOffice in the Corporate  Information Security Program

Business Requirements
Building an IS Program
Effective Communications
An interconnected world
Human interconnections

1.Business Requirements

2. Building an IS Program

3. Effective Communication

Interconnected devices

Arguably one of the greatest challenges to any Information Security (IS) program is introducing security controls that are not deemed too "intrusive" or a "hindrance" by the end user while still being able to maintain effective management and oversight of resources. 

​

HOffice ProServ wants to provide ideas on how to integrate an effective IS program that can likely be accepted and practiced by home office professionals.

bottom of page