India Advisory Notes
Remote working in the times of a
pandemic
Security practices: For employees
and organisations
2 | P a g e
About us
The IET is one of the world’s largest professional societies for engineers, headquartered in the UK.
Soon to turn 150 years, the IET works closely with industry, academia and government in its mission
to engineer a better world. In line with this, the IET also has specific global initiatives around key
sectors that are relevant to solving problems that impact the society at large. In India, the IET has
over 13,000 members and has wide ranging activities in alignment with the overall global IET strategy
that also includes sector focus in areas such as Future technologies. Future of Mobility and Transport,
as well as the Future of Work. Eminent engineers like Shri Ratan Tata, Former Chairman Tata Sons,
N R Narayana Murthy, Chairman Emeritus, Infosys and T V Ramachandran, President, Broadband
India Forum (Ex-Resident Director, Vodafone) are Honorary Fellows of the IET.
With our members, we are driving innovation and change in the fields of engineering and technology.
We research, investigate, review and analyse the industry’s challenges, proposing solutions that will
have a significant impact on the world for years to come.
This advisory note is part of a series, put together by the IET’s expert volunteers in India in the
backdrop of the global pandemic brought about by Covid-19. In this paper, experts from our
Cybersecurity Working group detail how employees and organisations should conduct themselves
while working remotely.
Read more about our Future Technology focus as well as our panels here:
https://india.theiet.org/innovation-knowledge/. To become a volunteer and to contribute, please write
to us at sectors@theiet.in
Disclaimers
This document is owned and maintained by the Institution of Engineering and Technology, India and
the design of the document is © IET India 2020.
The information contained in this document should not be interpreted as a representation of the views
of the IET, nor should it be assumed that it reflects any of its current or future policy. The information
cannot supersede any statutory or contractual requirements or liabilities and is offered without
prejudice.
While the authors, publisher and contributors believe that the information and guidance given in this
work are correct, all parties must rely upon their own skill and judgement while making use of them.
Neither the authors nor the publishers assume any liability to anyone for any loss or damage caused
by an error or omission in the work, as a result of negligence or any other cause.
3 | P a g e
Introduction
We are living in a heightened time of cyber risk. Organisations are still operational by allowing their
employees to work from home. Cybercriminals have started taking advantage of public fear to
generate coronavirus themed phishing attacks. We should be aware of COVID-19 tagged emails with
misleading links or attachments. The IET’s Cybersecurity working group has put together some best
practices to be followed at this crucial time to safeguard employees and as well as organisations that
are navigating the new order of remote working.
24x7 uptime and connectivity
Due to the current situation, companies and schools have planned for distance
learning and work-from-home setups. Though employees have started using the
work-from-home options, are the industries belonging to various sectors, including
PSUs and private companies prepared for this heavy influx of remote workers?
Organisations should conduct an exercise with their senior leadership teams and
business unit heads to list their critical business applications that will be accessed the
most by the employees. For cloud applications. Technology heads will have to work
with cloud service providers and get a hang about their business continuity plans.
Employers should ensure, by testing and validating the proper VPN connectivity for
higher utilisation than usual. For enterprises with high-cloud reliance (e.g., an
extension of capacity, native cloud systems), select cloud provider who has point-of-
presence in the geography where majority of the employees are present and provide
network path redundancy.
Timely backup
One crucial element in these times, more important than ever, is data backup. In
these times of the pandemic, employees from various operational units are using their
laptops, desktops, etc. In most of the cases, they either save their documents locally
on to these systems (for example, as a PDF file or MS office document) in an
unencrypted format. This is an issue, from a legal and compliance perspective. In
case of a cyberattack, they may also lose their data.
Therefore, employees who are working remotely, should back their data up in a timely
manner to remain unaffected in case of a cyberattack where they may compromise
their valuable data.
Access Control Policy
Financial services organisations, in a bid for business continuity to clients, may have
to provide right of access to employees via remote access. Usual practices like
password protection or data encryption may no longer suffice to counter smart data
theft. Hence, access control policies should be implemented and updated at various
entry points of the organisation. Also, the organisation can contain a potential
attacker’s path to crucial data and assets by limiting user access and privileges to the
information and tools needed for the employees to perform their immediate role.
4 | P a g e
Enhance the security of BYOD
Employees working from home for the first time will potentially use desktop
computers, laptops, tablets, and smartphones that are not protected to the same
level as workplace devices. They should consider using additional risk reduction
measures like document and file encryption, VPNs, regular scanning, and other best
practices to lower the potential for business intellectual property or financial theft.
Employees should secure home Wi-Fi by selecting the most reliable security protocol,
changing the Wi-Fi password often, and use MAC filtering, which can be done by
logging into the router as admin.
Beware of phishing scams and other targeted attacks
Recently, cases where attackers leveraging coronavirus-themed cyberattacks and
phishing emails masked as sensationalised Covid-19 news or charity pleas have
been on the rise. Fake applications like Corona live 1.1 have also been reported.
Malware attackers are targeting masses using custom and unique remote-access
trojan attacks that steal user information.
Employees must consciously maintain security best practices while browsing the
web. They should be more cautious about visiting sites while in session with the
enterprise web site. Concerned departments and ministries should spread public
awareness about these kinds of attacks to save people from being compromised at
this crucial time. Enterprises can keep communicating employees through awareness
campaign that reminds them of various social engineering attacks.
Regular Software Update
One of the main issues with most of the organisations operating in these crucial
times both PSUs and private enterprises is that they use legacy systems, proprietary
software, and software that may not be have been patched. Hence, enterprises need
to update their software regularly to keep employees protected in such times, failing
which, they will have to battle unproductivity and negative experiences of employees.
Enterprises must be on top of threat intelligence and push patches at the earliest
while employees must update with the latest patches of the base platform software
being used.
Conclusion
We are currently in what can be called the largest remote working experiment in the history of
mankind. Both organisations and employees are learning to work in this new world of work and
figuring out the best ways to keep their data safe while minimising disruption and delivering outputs.
The lockdown has brought to fore, the need for IT teams to be more vigilant, effective and frequent
communications with business leaders and their IT teams and seamless communication with the staff
team to ensure compliance.
5 | P a g e
6 | P a g e
Contributors
Anand Handa
Member – IET Cyber Security Working Group
Project Executive Officer, Interdisciplinary Centre for Cyber Security and
Cyber Defence of Critical Infrastructures, Department of Computer Science
and Engineering, Indian Institute of Technology, Kanpur
Arnab Chattopadhyay
Member – IET Cyber Security Working Group
Associate Director, IBM
Advisor
Arvind Tiwary
Chairperson – IET Cyber Security Working Group
Chair, TiE IoT Forum
If you have a question or query, please feel free to reach out to us at sectors@theiet.in. Read more
about our work at india.theiet.org

More Related Content

PDF
ZS Infotech v1.0
PPTX
security in it (data and cyber security)
PDF
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
PPTX
Security in IT (data and cyber security)
PDF
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
PPSX
Seclore Corporate Profile
PDF
08 pdf show-239
PDF
Securing a mobile oriented enterprise
ZS Infotech v1.0
security in it (data and cyber security)
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
Security in IT (data and cyber security)
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
Seclore Corporate Profile
08 pdf show-239
Securing a mobile oriented enterprise

What's hot (18)

PDF
Securing mobile devices_in_the_business_environment
PDF
The Essential Ingredient for Today's Enterprise
PPT
Enterprise it consumerization survey
PDF
How To Do BYOD Right
PDF
BYOD- A Productivity Catalyst
PDF
ICISS Newsletter Sept 14
PPT
Employment
PPT
OC CIO Roundtable BYOD
PPT
Federal IT Initiatives - BDPA Conference Executive Panel
PPT
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
PDF
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
PDF
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
PDF
A Bring Your Own Device Risk Assessment Model
PPTX
Business ethics ppt
PDF
Security annual report_mid2010
PDF
Intel HIMSS WoHIT mhealth
PDF
Advanced Network Security with Netmagic – Netmagic
PDF
CS-LRC-0114
Securing mobile devices_in_the_business_environment
The Essential Ingredient for Today's Enterprise
Enterprise it consumerization survey
How To Do BYOD Right
BYOD- A Productivity Catalyst
ICISS Newsletter Sept 14
Employment
OC CIO Roundtable BYOD
Federal IT Initiatives - BDPA Conference Executive Panel
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
A Bring Your Own Device Risk Assessment Model
Business ethics ppt
Security annual report_mid2010
Intel HIMSS WoHIT mhealth
Advanced Network Security with Netmagic – Netmagic
CS-LRC-0114
Ad

Similar to IET India cybersecurity advisory: security practices for remote working (20)

PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
DOCX
8Network Security April 2020FEATUREAre your IT staf.docx
DOCX
8Network Security April 2020FEATUREAre your IT staf.docx
PDF
Mayfield CXO Survey: Post COVID-19 Impacts to IT
PDF
E magazine march issue 2021
PDF
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
PDF
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
PDF
BEST CYBER SECURITY PRACTICES
PDF
Working from home- How secure is it.pdf
PDF
Close the Security Gaps of a Remote Workforce
PDF
Cyber attacks during COVID-19 Era
PDF
The top cybersecurity challenges post-lockdow
PDF
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
PDF
CTM360 Advisory: Remote Work Guidelines
PPTX
Project.pptx
PDF
Enhancing Cybersecurity in Remote Work-3.pdf
PDF
How to stop your business from collapsing because of Coronavirus
PDF
Business as usual, but from home instead!
PDF
Checklist to reduce security risk for your remote workers
PPTX
Data Protection & Privacy During the Coronavirus Pandemic
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
Mayfield CXO Survey: Post COVID-19 Impacts to IT
E magazine march issue 2021
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
BEST CYBER SECURITY PRACTICES
Working from home- How secure is it.pdf
Close the Security Gaps of a Remote Workforce
Cyber attacks during COVID-19 Era
The top cybersecurity challenges post-lockdow
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
CTM360 Advisory: Remote Work Guidelines
Project.pptx
Enhancing Cybersecurity in Remote Work-3.pdf
How to stop your business from collapsing because of Coronavirus
Business as usual, but from home instead!
Checklist to reduce security risk for your remote workers
Data Protection & Privacy During the Coronavirus Pandemic
Ad

More from IET India (20)

DOCX
Digital twins for secure, green and healthy future cities
DOCX
Leveraging blockchain to transform rattled supply chains
PDF
Ventilator tracking for Covid-19 preparedness
PDF
Electric vehicle charging infrastructure in India: Challenges and road ahead
PDF
Resetting urban mobility 2020+ in India
PDF
Learning and Skilling - A Future Work Perspective
PDF
Enabling Indian manufacturing MSMEs for global competitiveness
PDF
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
PDF
E-mobility trends in India: Challenges and Opportunities
PDF
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
PDF
Urban mobility in Bengaluru- Key takeaway report
PDF
IET's Engineering the Future of Work Playbook
PDF
IoT reshaping society
PDF
IIoT for India's growth
PDF
IoT and security
PDF
IoT for the energy sector
PDF
Indian telecom getting ready for m2 m iot
PDF
IoT case studies from india
PDF
Fresh Thinking to SAFENET for IoT
PDF
Smart Education – Making education Efficient, Affordable and Reachable for India
Digital twins for secure, green and healthy future cities
Leveraging blockchain to transform rattled supply chains
Ventilator tracking for Covid-19 preparedness
Electric vehicle charging infrastructure in India: Challenges and road ahead
Resetting urban mobility 2020+ in India
Learning and Skilling - A Future Work Perspective
Enabling Indian manufacturing MSMEs for global competitiveness
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...
E-mobility trends in India: Challenges and Opportunities
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
Urban mobility in Bengaluru- Key takeaway report
IET's Engineering the Future of Work Playbook
IoT reshaping society
IIoT for India's growth
IoT and security
IoT for the energy sector
Indian telecom getting ready for m2 m iot
IoT case studies from india
Fresh Thinking to SAFENET for IoT
Smart Education – Making education Efficient, Affordable and Reachable for India

Recently uploaded (20)

PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Architecture types and enterprise applications.pdf
Benefits of Physical activity for teenagers.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
OpenACC and Open Hackathons Monthly Highlights July 2025
Module 1.ppt Iot fundamentals and Architecture
1 - Historical Antecedents, Social Consideration.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
A review of recent deep learning applications in wood surface defect identifi...
Consumable AI The What, Why & How for Small Teams.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
UiPath Agentic Automation session 1: RPA to Agents
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
A proposed approach for plagiarism detection in Myanmar Unicode text
sbt 2.0: go big (Scala Days 2025 edition)
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Abstractive summarization using multilingual text-to-text transfer transforme...
Architecture types and enterprise applications.pdf

IET India cybersecurity advisory: security practices for remote working

  • 1. India Advisory Notes Remote working in the times of a pandemic Security practices: For employees and organisations
  • 2. 2 | P a g e About us The IET is one of the world’s largest professional societies for engineers, headquartered in the UK. Soon to turn 150 years, the IET works closely with industry, academia and government in its mission to engineer a better world. In line with this, the IET also has specific global initiatives around key sectors that are relevant to solving problems that impact the society at large. In India, the IET has over 13,000 members and has wide ranging activities in alignment with the overall global IET strategy that also includes sector focus in areas such as Future technologies. Future of Mobility and Transport, as well as the Future of Work. Eminent engineers like Shri Ratan Tata, Former Chairman Tata Sons, N R Narayana Murthy, Chairman Emeritus, Infosys and T V Ramachandran, President, Broadband India Forum (Ex-Resident Director, Vodafone) are Honorary Fellows of the IET. With our members, we are driving innovation and change in the fields of engineering and technology. We research, investigate, review and analyse the industry’s challenges, proposing solutions that will have a significant impact on the world for years to come. This advisory note is part of a series, put together by the IET’s expert volunteers in India in the backdrop of the global pandemic brought about by Covid-19. In this paper, experts from our Cybersecurity Working group detail how employees and organisations should conduct themselves while working remotely. Read more about our Future Technology focus as well as our panels here: https://india.theiet.org/innovation-knowledge/. To become a volunteer and to contribute, please write to us at sectors@theiet.in Disclaimers This document is owned and maintained by the Institution of Engineering and Technology, India and the design of the document is © IET India 2020. The information contained in this document should not be interpreted as a representation of the views of the IET, nor should it be assumed that it reflects any of its current or future policy. The information cannot supersede any statutory or contractual requirements or liabilities and is offered without prejudice. While the authors, publisher and contributors believe that the information and guidance given in this work are correct, all parties must rely upon their own skill and judgement while making use of them. Neither the authors nor the publishers assume any liability to anyone for any loss or damage caused by an error or omission in the work, as a result of negligence or any other cause.
  • 3. 3 | P a g e Introduction We are living in a heightened time of cyber risk. Organisations are still operational by allowing their employees to work from home. Cybercriminals have started taking advantage of public fear to generate coronavirus themed phishing attacks. We should be aware of COVID-19 tagged emails with misleading links or attachments. The IET’s Cybersecurity working group has put together some best practices to be followed at this crucial time to safeguard employees and as well as organisations that are navigating the new order of remote working. 24x7 uptime and connectivity Due to the current situation, companies and schools have planned for distance learning and work-from-home setups. Though employees have started using the work-from-home options, are the industries belonging to various sectors, including PSUs and private companies prepared for this heavy influx of remote workers? Organisations should conduct an exercise with their senior leadership teams and business unit heads to list their critical business applications that will be accessed the most by the employees. For cloud applications. Technology heads will have to work with cloud service providers and get a hang about their business continuity plans. Employers should ensure, by testing and validating the proper VPN connectivity for higher utilisation than usual. For enterprises with high-cloud reliance (e.g., an extension of capacity, native cloud systems), select cloud provider who has point-of- presence in the geography where majority of the employees are present and provide network path redundancy. Timely backup One crucial element in these times, more important than ever, is data backup. In these times of the pandemic, employees from various operational units are using their laptops, desktops, etc. In most of the cases, they either save their documents locally on to these systems (for example, as a PDF file or MS office document) in an unencrypted format. This is an issue, from a legal and compliance perspective. In case of a cyberattack, they may also lose their data. Therefore, employees who are working remotely, should back their data up in a timely manner to remain unaffected in case of a cyberattack where they may compromise their valuable data. Access Control Policy Financial services organisations, in a bid for business continuity to clients, may have to provide right of access to employees via remote access. Usual practices like password protection or data encryption may no longer suffice to counter smart data theft. Hence, access control policies should be implemented and updated at various entry points of the organisation. Also, the organisation can contain a potential attacker’s path to crucial data and assets by limiting user access and privileges to the information and tools needed for the employees to perform their immediate role.
  • 4. 4 | P a g e Enhance the security of BYOD Employees working from home for the first time will potentially use desktop computers, laptops, tablets, and smartphones that are not protected to the same level as workplace devices. They should consider using additional risk reduction measures like document and file encryption, VPNs, regular scanning, and other best practices to lower the potential for business intellectual property or financial theft. Employees should secure home Wi-Fi by selecting the most reliable security protocol, changing the Wi-Fi password often, and use MAC filtering, which can be done by logging into the router as admin. Beware of phishing scams and other targeted attacks Recently, cases where attackers leveraging coronavirus-themed cyberattacks and phishing emails masked as sensationalised Covid-19 news or charity pleas have been on the rise. Fake applications like Corona live 1.1 have also been reported. Malware attackers are targeting masses using custom and unique remote-access trojan attacks that steal user information. Employees must consciously maintain security best practices while browsing the web. They should be more cautious about visiting sites while in session with the enterprise web site. Concerned departments and ministries should spread public awareness about these kinds of attacks to save people from being compromised at this crucial time. Enterprises can keep communicating employees through awareness campaign that reminds them of various social engineering attacks. Regular Software Update One of the main issues with most of the organisations operating in these crucial times both PSUs and private enterprises is that they use legacy systems, proprietary software, and software that may not be have been patched. Hence, enterprises need to update their software regularly to keep employees protected in such times, failing which, they will have to battle unproductivity and negative experiences of employees. Enterprises must be on top of threat intelligence and push patches at the earliest while employees must update with the latest patches of the base platform software being used. Conclusion We are currently in what can be called the largest remote working experiment in the history of mankind. Both organisations and employees are learning to work in this new world of work and figuring out the best ways to keep their data safe while minimising disruption and delivering outputs. The lockdown has brought to fore, the need for IT teams to be more vigilant, effective and frequent communications with business leaders and their IT teams and seamless communication with the staff team to ensure compliance.
  • 5. 5 | P a g e
  • 6. 6 | P a g e Contributors Anand Handa Member – IET Cyber Security Working Group Project Executive Officer, Interdisciplinary Centre for Cyber Security and Cyber Defence of Critical Infrastructures, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur Arnab Chattopadhyay Member – IET Cyber Security Working Group Associate Director, IBM Advisor Arvind Tiwary Chairperson – IET Cyber Security Working Group Chair, TiE IoT Forum If you have a question or query, please feel free to reach out to us at sectors@theiet.in. Read more about our work at india.theiet.org