Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 21, 2025
  1. All
  2. Engineering
  3. Network Security

Your team is working remotely on personal devices. How do you secure their access?

How do you keep your remote team secure on personal devices? Share your strategies for safeguarding access.

Network Security Network Security

Network Security

+ Follow
Last updated on Mar 21, 2025
  1. All
  2. Engineering
  3. Network Security

Your team is working remotely on personal devices. How do you secure their access?

How do you keep your remote team secure on personal devices? Share your strategies for safeguarding access.

Add your perspective
Help others by sharing more (125 characters min.)
28 answers
  • Contributor profile photo
    Contributor profile photo
    Jonnalagadda Surya Kiran

    Assistant Professor, CSE at K L University || 3 X AWS Certified || 2 X AZURE Certified || RedHat EX183 Certified || Automation Anywhere Certified

    • Report contribution

    Secure remote access by enforcing strong authentication (MFA), using VPNs, implementing endpoint security tools, restricting access based on roles and ensuring devices have upto date security patches. Regular security training and monitoring for threats are also essential.

    Like
    14
  • Contributor profile photo
    Contributor profile photo
    Hasnan M.

    I empower CPA firms and Startups to achieve financial excellence by leveraging finance resource augmentation, strategic US tax expertise, and tailored accounting advisory as Co-Founder of Nexgen Financial Experts | xPwC

    • Report contribution

    When I worked remotely, I kept my device safe with a VPN, extra login steps (MFA), and updates. Security software, regular trainings, and simple safety tips helped too, especially on risky Wi-Fi.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Clarence Tinotenda Chipiro 🇿🇼

    Network Engineer #ISP #MSP #CSP Cisco, Fortinet, Aviatrix, AWS, Microsoft, ServiceNow, Freshdesk, iMaster, Splunk Enterprise, Zendesk, Atlassian Confluence

    (edited)
    • Report contribution

    BYOD absolutely needs P2S virtual connections. This can be achieved by setting up SSL VPNs and configuring security profiles for them on the firewall to ensure secure access control.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    MahendraKumar V

    Cloud Engineer | 9+ Years Experience | AWS Certified SysOps Administrator – Associate | Linux & DevOps Expert | Docker | CI/CD | Git/GitHub | Terraform | Kubernetes | Nagios | Prometheus | Grafana

    • Report contribution

    There are multiple hardware and software technologies that work together to provide secure remote access for an organization’s remote workforce. The technologies an organization chooses depend upon the organization’s size, culture, and the number of onsite employees it maintains compared to the size of its remote workforce. Single sign-on (SSO) technologies enable a user to access multiple network applications with a single username and password. Users like this security approach as they only have to remember one username and password to access multiple applications and systems. The virtual private network, or VPN, provides secure remote access via an encrypted tunnel to connect a user’s computer or device to an organization’s IT network

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Aftab Ahmad

    |AI Engineer @XSol |Computer Vision Engineer | Deep Learning Expert | Python Developer | Data Scientist | NLP & Generative AI Specialist | AI chatbots| Ex Ai engineer @ saincube |

    • Report contribution

    VPN & Zero Trust – Enforce VPN access with Zero Trust policies to verify users and devices. MFA – Require Multi-Factor Authentication (MFA) for all logins to prevent unauthorized access. Endpoint Security – Use EDR (Endpoint Detection & Response) to monitor and protect devices. Access Control – Implement Role-Based Access Control (RBAC) with the principle of least privilege. Secure Connections – Enforce SSH keys, encrypted communication, and SSO authentication. Regular Audits – Conduct security audits, log monitoring, and real-time threat detection. Security Training – Educate team members on phishing, password hygiene, and best practices.

    Like
    1
View more answers
Network Security Network Security

Network Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Network Security

No more previous content
  • Your network security is at risk due to an insecure IoT device. How will you prevent a potential data breach?

    10 contributions

  • Your team is accused of a security breach they didn't cause. How do you prove their innocence?

    14 contributions

  • Struggling to explain network security protocols to non-technical colleagues in a remote work setup?

    14 contributions

  • Employees are bypassing VPN protocols in your company. Are your network security measures enough?

    7 contributions

  • Your remote team relies heavily on VPNs. How can you safeguard against potential vulnerabilities?

    13 contributions

  • You're integrating third-party software into your network. How do you mitigate the security risks?

    6 contributions

  • You need to address a diverse audience on network security. How do you make your presentation effective?

    9 contributions

  • Clients are worried about complex access control measures. How do you ease their concerns?

    7 contributions

  • Ensuring robust security is critical for your network. How do you maintain seamless access?

    2 contributions

  • You're facing pushback from your IT team on network security updates. How can you get them on board?

    9 contributions

No more next content
See all

More relevant reading

  • Computer Hardware
    What is the best way to fix a computer that won't turn on?
  • Operating Systems
    Here's how you can maximize the advantages of a diverse professional network in the operating systems field.
  • Computer Repair
    Your team is divided on fixing a computer glitch. How can you bridge the gap and reach a consensus?
  • Computer Networking
    What steps should you take when your computer doesn't recognize a new driver?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
1
28 Contributions