...

Managing Laptops for Remote Teams

Table of Contents

Why managing remote laptops matters
Challenges of supporting remote and hybrid workers
Key risks associated with remote laptops
Best practices for managing laptops remotely

Centralised management of devices

Full Disk Encryption

Strong Password Policy

Multi-Factor Authentication (MFA)

Automatic Software Updates

Endpoint Protection

Secure Remote Access

Remote Device Lock and Erase

Role Based Access Control

Device security requirements
Software and update management
Remote monitoring and support
Laptop lifecycle and replacement planning
Staff responsibilities and acceptable use
Remote laptop management checklist
Remote device security checklist
Remote worker IT setup checklist

FAQs

Yes, the data on a company-issued laptop is far easier to secure and manage than data stored on a personal device (BYOD). Companies should provide employees with company laptops whenever possible, and for occasional remote workers, a BYOD policy can be used.

Use encryption; implement MFA; set automatic updates; use endpoint protection; create a simple home working guide (password protect your wi-fi; do not allow family members to access the laptop).

Yes! You can use tools such as Intune or Microsoft Quick Assist to help you troubleshoot/assist users remotely without needing to visit them at their homes.

Remote laptops should be replaced every three to four years based on normal usage for a cost of approximately £300-600 per device; plan to replace them in a phased manner.

This is based on the level of risk; you must complete a device health check as well as compliance checks only. You must also be transparent about policy changes and update your Privacy Notice, as well as follow the ICO guidelines concerning monitoring employees remotely.

Microsoft 365 Business Premium has all the security you need in the form of Intune, Encryption, MFA and Defender.

MFA should be a requirement for work content. You should also explain that using MFA secures their own data as well as your work data. Additionally, provide training on how to set up MFA and why it's important.

Using MFA is required along with ensuring the mobile device has a separate work profile (Android/iOS) and that you can remotely wipe data (i.e. delete) from the device if it becomes lost. Create a written BYOD policy for your employees.

About This Guide

This guide was created by the Computer Support Centre to help UK SMEs (Small and Medium Enterprises) understand how to manage laptops used by remote and hybrid teams in a secure manner. One of the impacts of an increase in remote working throughout the UK is that many employees are accessing the company’s systems from home, coffee shops, and client’s locations; these types of environments present new types of security and management challenges.

This guide aims to provide practical and uncomplicated ways of managing remote laptops and how to protect the company’s data while ensuring staff are working efficiently. Additionally, it covers the primary risks associated with managing remote laptops, examples include lost laptops, weak passwords, outdated software and connecting to unsecured Wi-Fi. As well as highlighting practical controls e.g encryption, remote management software and multi-factor authentication that can be put in place by businesses to meet their obligations under the UK GDPR and reduce potential data breaches.

Conclusion

The conclusion summaries the advantages of remote or hybrid working models for contemporary organisations but emphasizes the importance of proper management of company devices (laptops, etc.) to minimize risk (of data loss, cyber attack, etc.) due to lack of controls (lost laptops, weak passwords, operating systems out of date, insecure networks).

Implementing practical management strategies (i.e., encryption, multi-factor authentication, auto-update, endpoint protection, centralised device management) will help to mitigate many of these risks. Along with consistent monitoring through regularly scheduled (to prevent security breaches) and clearly communicated employee policies, using planned replacement cycles will go a long way towards maintaining both security and productivity for the organisation.

While the majority of SME’s do not need to use complex management processes to ensure secure laptop management, they must use consistent policies, have the proper tools and service and keep their employees aware through ongoing training to be able to allow flexible working while still providing protection for (the organisation’s) data, employees and customers.