Remote Working Considerations for Business Owners – Part 2: Cyber Security

Posted on by Net Primates

About this video

Enabling secure remote working is a different proposition from traditional IT where access to your data was heavily restricted based on physical + location based access.

This video explains what you to be aware of, and more importantly what to do to protect your business’s most important asset – your data!


In the video we cover:

  • Concern #1: Unknown devices & location
  • Concern #2: Increased availability of access (for both staff + hackers!)
  • Concern #3: Human Behaviour (of both staff + hackers!)
  • Solutions to facilitate secure remote working which we agree is here to stay in one form or another.


Take away actions on this topic are

  1. Review existing Remote Working facilitates and ensure they have appropriate security
  2. Document which applications + services are ‘acceptable’ for use in your business
  3. Watch ‘Part 3‘ of this series – Collaboration


For more videos in this series, please subscribe to our youtube channel linked below, or visit

Contact Us if you have any questions on this topic, feedback on how we can improve these videos, or suggestions for future topics you’d like us to cover!

Resources related to this video

Net Primates Videos

Return to our IT & Cyber Security Tips page at

Recent Tips

Cyber Security 101 - Passwords

About this video Exploring the MASSIVE impact that Passwords have on Cyber Security, why theyR...

What to do if your password is hacked or stolen

Summary of the steps outlined in Video Change your password immediately – even if you̵...

Don't reuse passwords! Here is why ...

About this video This video explains problems with reusing passwords across multiple sites / serv...

How to create strong passwords you can actually remember!

About this video A quick & easy to learn, process to generate AND REMEMBER secure passwords f...

What is Multi Factor Authentication (MFA) and why you should use it

About this video This video introduces the recent evolution of Computer Authentication, from basi...