HOffice ProServ
Merging cybersecurity best practices with today's flexible home office staff
​When deciding on what security controls are appropriate for your business, it is important to evaluate the importance of the information being protected and the impact to the business and its clients if that information were to be disclosed to unauthorized parties. The biggest mistake is focusing on the protection of the technology. Remember that technology supports the the confidentiality, integrity, and availability of information and information flow but whose implemented security controls are defined by the value of the information they process, store, present, and transmit.
​
In this section, we discuss cybersecurity controls in Cloud, Endpoint, and Mobile technologies and how they can be used to support business Information Security initiatives, policies, and requirements.
Cybersecurity: It's Role in Information Security
Cloud Security
Cloud services provide businesses with the ability to remotely utilize the infrastructure, platform, and application service(s) of host providers without requiring full time IT staffs or investing and maintaining complex server and infrastructure environments.
​
For the HOffice professional, this allows for flexibility, mobility, and centralized control, oversight, and management of important business data and resources.
​
This section will discuss some of the security considerations and implications when using a cloud service.
Endpoint Security
Endpoint systems are crucial to business productivity. However, unlike centrally managed cloud computing resources, endpoint systems vary widely (e.g., platforms, makes, models, versions, and software). The biggest concern? These devices tend to be left under the physical and logical control of individuals.
​
Endpoint security is concerned with security management and oversight of end-user devices used to gain access to and process business resources.
​
Although endpoints include servers and other core infrastructure devices, the focus in this section are those end-user devices such as desktop workstations, laptops, and mobile devices.
Mobile Security
Mobile security involves the application of security controls for highly mobile devices such as smartphones and tablets.
​
Although these devices should be included and discussed as part of your endpoint security program, there are additional concerns that these devices bring to an organization.
​
This section is focused on mobile aspects (e.g., travel) and considerations (e.g., ease of loss) when developing security controls for them.