{"id":4531,"date":"2020-07-29T03:40:13","date_gmt":"2020-07-29T03:40:13","guid":{"rendered":"https:\/\/berg-software.com\/?p=4531"},"modified":"2020-08-12T04:56:59","modified_gmt":"2020-08-12T04:56:59","slug":"secure-remote-work","status":"publish","type":"post","link":"https:\/\/www.berg-software.com\/en\/secure-remote-work\/","title":{"rendered":"How to: Secure remote work"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.4.1&#8243;][et_pb_fullwidth_post_title categories=&#8221;off&#8221; comments=&#8221;off&#8221; featured_placement=&#8221;background&#8221; _builder_version=&#8221;4.4.6&#8243; title_font=&#8221;Roboto||||||||&#8221; title_text_color=&#8221;#ff6317&#8243; title_font_size=&#8221;50px&#8221; meta_font=&#8221;|300|||||||&#8221; meta_text_color=&#8221;#000000&#8243; meta_font_size=&#8221;16px&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(248,248,248,0.8)&#8221; background_color_gradient_end=&#8221;rgba(248,248,248,0.5)&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; height=&#8221;400px&#8221; global_module=&#8221;403&#8243; locked=&#8221;off&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.1&#8243; custom_padding=&#8221;|||0px||&#8221; locked=&#8221;off&#8221;][et_pb_row use_custom_gutter=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;50px|20%|||false|false&#8221; border_color_left=&#8221;rgba(0,0,0,0)&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<p>Remote work has been around for a long while, steadily crawling up people\u2019s attention. But the recent months have brought it to a peak, with a 130% increase in interest between end-February and mid-March 2020. Some have been praising it for a while (e.g. Jason Fried and David Heinemeier Hansson -creators of Ruby on Rails, Basecamp, Hey- <a href=\"https:\/\/basecamp.com\/books\/remote\" target=\"_blank\" rel=\"noopener noreferrer\">wrote a #1 bestseller book about it<\/a>, in 2013!); others see it as blowing-up the very base of technological innovation (see John Hagel\u2019s <a href=\"https:\/\/marker.medium.com\/what-silicon-valley-loses-if-everyone-goes-remote-761b398dc9fb\" target=\"_blank\" rel=\"noopener noreferrer\"><em>How Remote Work Could Destroy Silicon Valley<\/em><\/a>).<\/p>\n<p>At Berg Software, we take a rather pragmatic approach on remote work. We\u2019ve \u201cbeen there, done that\u201d since mid-1990s, as quality providers of outsourced, custom-made software:<\/p>\n<ul>\n<li>Our staff have adopted, rolled and mastered remote work processes. This brings a special kind of resilience and tight integration with clients\u2019 projects, processes, work modes, deadlines etc. (Oh, and birthdays!)<\/li>\n<li>We have strong proofs that remote work increases talent pool, reduces turnover, and improves our ability to conduct business across multiple time zones. For developers it means having access to the best job regardless of location, better work-life balance and higher productivity.<\/li>\n<\/ul>\n<p>Remote work comes with a huge range of topics to be discussed. We think we\u2019re mostly qualified to talk about your benefits and the security-related challenges, so let\u2019s keep it focused:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;3&#8243; _builder_version=&#8221;4.4.1&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|20%|||false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;rgba(0,0,0,0)&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_image src=&#8221;\/\/cdn.berg-software.com\/wp-content\/uploads\/Evolution-of-22remote-work22-on-Google-Trends.png&#8221; alt=&#8221;Evolution of %22remote work%22 on Google Trends&#8221; title_text=&#8221;Evolution of %22remote work%22 on Google Trends&#8221; _builder_version=&#8221;4.4.6&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;3&#8243; _builder_version=&#8221;4.4.1&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|20%|||false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;rgba(0,0,0,0)&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;25px||||false|false&#8221; custom_padding=&#8221;|||25px|false|false&#8221; hover_enabled=&#8221;0&#8243; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h2>Remote work basics<\/h2>\n<p>Whether you want to expand your own remote work system beyond lockdowns, or looking into long term outsourcing \/ nearshoring solutions, we think you will benefit from:<\/p>\n<p><strong>Lower costs<\/strong><\/p>\n<ul>\n<li>Increased efficiency by eliminating commute time.<\/li>\n<li>Less office space and real estate-related costs.<\/li>\n<li>Improved employment flexibility.<\/li>\n<li>Higher sustainability \/ lower environmental impact.<\/li>\n<\/ul>\n<p><strong>Access to skills<\/strong><\/p>\n<ul>\n<li>Wider talent pool: you can recruit from virtually anywhere.<\/li>\n<li>Lower competition for talent.<\/li>\n<li>Happier and more autonomous employees.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;3&#8243; _builder_version=&#8221;4.4.1&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|20%|||false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;rgba(0,0,0,0)&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;25px||||false|false&#8221; custom_padding=&#8221;|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h2>Security-related challenges of remote work<\/h2>\n<p>The first prerequisite for remote software development is your partner\u2019s environmental security (i.e. everything from processes, flows, data, communications etc.). Regardless of your company\u2019s focus, we strongly believe you should go past the mere antivirus coverage, and dive deep into:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h3>Protection of transferred data and communication<\/h3>\n<p>You will want to make sure that \u201cdata in transit\u201d* is secure. Your suppliers and \/ or employees should protect data while transiting networks, against tampering and eavesdropping, by using a mix of network protection and encryption. Never allow for any HTTP connections to be used. Please insist on any other used protocols to be secured and encrypted.<\/p>\n<p>* \u201cInformation that flows over the public or untrusted network such as the Internet and data that flows in the confines of a private network such as a corporate or enterprise Local Area Network.\u201d (via <a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_in_transit\">Wikipedia<\/a>)<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|||25px|false|false&#8221; hover_enabled=&#8221;0&#8243; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h3>Asset protection and resilience<\/h3>\n<p>Request your suppliers (and support your employees) to protect the assets \/ physical support of your data, in order to make sure that it\u2019s not tampered, lost or damaged. Depending on your business\u2019 specifics, you can make sure that some or all of these actions are applied:<\/p>\n<p><strong>Data at rest protection<\/strong>: security procedures around data that is being stored in a stable medium; ensure that stored data is not vulnerable to hacking or other unauthorised access.<\/p>\n<ul>\n<li>Physical access to data: deny unauthorised persons\u2019 access to data equipment.<\/li>\n<li>Data sanitisation: whenever needed \/ requested, destroy the data stored on a memory device to make it unrecoverable.<\/li>\n<li>Equipment disposal: valuable equipment housing confidential data should not reach unauthorised persons and result in data breach or identity theft. Measures can vary from equipment tracking to refurbishing and complete destruction.<\/li>\n<\/ul>\n<p><strong>Physical resilience and availability<\/strong>: make sure there are mechanism to cope \/ backup \/ compensate in the event of an outage.<\/p>\n<p><strong>Physical location<\/strong>: prevent any unauthorized individuals from gaining physical access to the data devices \/ data center.<\/p>\n<p><strong>Data center security<\/strong>: avoid unauthorized access and manipulation of your data center&#8217;s resources (e.g. denial-of-service (DoS), theft of confidential information, data alteration, data loss etc.)<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h3>Separation of data<\/h3>\n<p>Request your supplier (and \/ or employee) to separate different data involved in a service, in order to prevent malicious or compromised users from affecting the service or data of another service.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h3>Secure Development<\/h3>\n<p>Insist that your suppliers\u2019 software development lifecycle processes integrate best practices for confidentiality, integrity and availability protection.<\/p>\n<p>Avoid all software security vulnerabilities (e.g. <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener noreferrer\">the OWASP Top Ten<\/a> or <a href=\"https:\/\/cwe.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CWE listings<\/a>).<\/p>\n<p>Take precautions that any own, 3rd party or open source software used for providing the Supplier services do not contain known backdoors, viruses, trojans or other kind of malicious code.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|||25px|false|false&#8221; hover_enabled=&#8221;0&#8243; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h3>Operational Security<\/h3>\n<p>Established clear and strict processes and procedures to ensure the operational security of services, including:<\/p>\n<ul>\n<li>Security patch management: the ongoing process of applying updates to solve code vulnerabilities \/ errors of applications across your system.<\/li>\n<li>Protective monitoring: alert on individual and broader malicious events, in order to mitigate risk and speed-up remediation.<\/li>\n<li>Configuration and change management: all requests are reviewed and managed in a secure manner;<\/li>\n<li>Secure decommissioning: applications and systems are safely removed from use.<\/li>\n<li>Vulnerability management: identify, classify, prioritise, remedy and mitigate software vulnerabilities.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h3>Personnel Security<\/h3>\n<p>Personnel security screening and \/ or security education is performed regularly and is adequate for all resources utilized.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;3&#8243; _builder_version=&#8221;4.4.4&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px|20%|75px||false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;rgba(0,0,0,0)&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_text _builder_version=&#8221;4.4.6&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.5em&#8221; quote_font=&#8221;|700|||||||&#8221; quote_text_align=&#8221;left&#8221; quote_font_size=&#8221;16px&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;30px&#8221; header_3_font_size=&#8221;23px&#8221; header_4_font=&#8221;||||||||&#8221; header_4_font_size=&#8221;16px&#8221; header_4_line_height=&#8221;1.5em&#8221; header_5_font_size=&#8221;14px&#8221; custom_margin=&#8221;25px||||false|false&#8221; custom_padding=&#8221;|||25px|false|false&#8221; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#ff6317&#8243;]<\/p>\n<h2>\u2014<\/h2>\n<p>As you have just figured, at Berg Software we\u2019re a bit of security geeks. Whether it\u2019s NDA, VPN or GDPR, we take it personally. In all our partners\u2019 remote teams, we act like their own employees, both when it comes to integration *and* security protocols. The result: quick, efficient software that just works!<\/p>\n<p>Do you do it differently? <a href=\"https:\/\/berg-software.com\/contact-berg-software\/\">Let us know<\/a>!<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;#eeeeee&#8221; custom_padding=&#8221;50px||50px||false|false&#8221; border_color_top=&#8221;#ff6317&#8243; global_module=&#8221;1642&#8243;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.4.1&#8243; custom_padding=&#8221;0px|||||&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_social_media_follow _builder_version=&#8221;4.4.4&#8243; text_orientation=&#8221;left&#8221;][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/berg-computers-srl\/&#8221; _builder_version=&#8221;4.4.4&#8243; background_color=&#8221;#007bb6&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;twitter&#8221; url=&#8221;https:\/\/twitter.com\/berg_software&#8221; _builder_version=&#8221;4.4.4&#8243; background_color=&#8221;#00aced&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; url=&#8221;https:\/\/www.facebook.com\/bergCOMPUTERS&#8221; _builder_version=&#8221;4.4.4&#8243; background_color=&#8221;#3b5998&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;instagram&#8221; url=&#8221;https:\/\/www.instagram.com\/berg_software\/&#8221; _builder_version=&#8221;4.4.4&#8243; background_color=&#8221;#ea2c59&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]instagram[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_post_nav in_same_term=&#8221;on&#8221; show_next=&#8221;off&#8221; _builder_version=&#8221;4.4.1&#8243; title_text_color=&#8221;#ff6317&#8243; custom_padding=&#8221;|25px|||false|false&#8221;][\/et_pb_post_nav][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.1&#8243;][et_pb_post_nav in_same_term=&#8221;on&#8221; show_prev=&#8221;off&#8221; _builder_version=&#8221;4.4.1&#8243; title_text_color=&#8221;#ff6317&#8243; custom_padding=&#8221;|||25px|false|false&#8221;][\/et_pb_post_nav][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;CONTACT&#8221; _builder_version=&#8221;4.4.1&#8243; background_color=&#8221;#d2d2d2&#8243; custom_padding=&#8221;75px||75px||false|false&#8221; global_module=&#8221;1544&#8243;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; admin_label=&#8221;Service Section Title&#8221; _builder_version=&#8221;4.4.1&#8243; custom_padding=&#8221;||25px||false|false&#8221; animation_direction=&#8221;top&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.1&#8243; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;14px&#8221; text_line_height=&#8221;1.1em&#8221; header_5_font=&#8221;|600|||||||&#8221; header_5_text_color=&#8221;#ffffff&#8221; header_5_font_size=&#8221;14px&#8221; header_5_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||||false|false&#8221;]29 years in business | 2700 software projects | 760 clients | 24 countries<\/p>\n<h5>We turn ideas into software. What is yours?<\/h5>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Title&#8221; _builder_version=&#8221;4.4.1&#8243; header_text_align=&#8221;center&#8221; header_2_font=&#8221;|300|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#ff6317&#8243; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;0.9em&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;25px||25px||false|false&#8221;]<\/p>\n<h2>Get in touch<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.4.4&#8243;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.4.4&#8243;][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.4.4&#8243;][et_pb_contact_form email=&#8221;contact@bergsoftprod.wpengine.com&#8221; custom_message=&#8221;WEBFORM MESSAGE||et_pb_line_break_holder||\uff3f||et_pb_line_break_holder||FROM: %%Name%%||et_pb_line_break_holder||EMAIL: %%Email%%||et_pb_line_break_holder||PHONE NUMBER: %%Phone_number%%||et_pb_line_break_holder||COMPANY: %%Company_name%%||et_pb_line_break_holder||TERMS &#038; CONDITIONS: %%Terms_and_Conditions%%||et_pb_line_break_holder||DATA PRIVACY POLICY: %%Data_Privacy_Policy%%||et_pb_line_break_holder||\uff3f||et_pb_line_break_holder||MESSAGE:||et_pb_line_break_holder||%%Message%%&#8221; success_message=&#8221;Thank you for reaching out! Your message was sent. We will get back to you right away.&#8221; _builder_version=&#8221;4.4.4&#8243; form_field_background_color=&#8221;#d2d2d2&#8243; form_field_text_color=&#8221;#ffffff&#8221; form_field_focus_background_color=&#8221;#ffffff&#8221; form_field_focus_text_color=&#8221;#000000&#8243; title_level=&#8221;h2&#8243; title_font=&#8221;|300|||||||&#8221; title_text_color=&#8221;#ff6317&#8243; title_font_size=&#8221;30px&#8221; form_field_line_height=&#8221;1.5em&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#ff6317&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;0px&#8221; button_icon=&#8221;%%3%%&#8221; button_on_hover=&#8221;off&#8221; border_color_all=&#8221;#ffffff&#8221; border_width_bottom=&#8221;1px&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name *&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243; form_field_background_color=&#8221;#d2d2d2&#8243; form_field_text_color=&#8221;#ffffff&#8221; form_field_focus_background_color=&#8221;#ffffff&#8221; form_field_focus_text_color=&#8221;#000000&#8243; border_width_bottom=&#8221;1px&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email address *&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Phone_number&#8221; field_title=&#8221;Phone number&#8221; required_mark=&#8221;off&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Company_name&#8221; field_title=&#8221;Company name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message *&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243; form_field_background_color=&#8221;#d2d2d2&#8243; form_field_focus_background_color=&#8221;#ffffff&#8221; form_field_focus_text_color=&#8221;#000000&#8243; border_width_bottom=&#8221;1px&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Terms_and_Conditions&#8221; field_title=&#8221; &#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22I have read and accepted the Terms and Conditions%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Data_Privacy_Policy&#8221; field_title=&#8221; &#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22I have read and accepted the Data Privacy Policy%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.4.4&#8243;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first prerequisite for remote software development is your partner\u2019s environmental security (i.e. processes, flows, data, communications etc.). Regardless of your company\u2019s focus, we strongly believe you should go past the mere antivirus coverage.<\/p>\n","protected":false},"author":7,"featured_media":4554,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[138,33],"tags":[],"class_list":["post-4531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to: Secure remote work | Berg Software<\/title>\n<meta name=\"description\" content=\"Secure remote work is a basic &quot;must have&quot; of software outsourcing. We identify security-related challenges of remote work and describe several solutions.\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to: Secure remote work | Berg Software\" \/>\n<meta property=\"og:description\" content=\"Secure remote work is a basic &quot;must have&quot; of software outsourcing. We identify security-related challenges of remote work and describe several solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Berg Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bergCOMPUTERS\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-29T03:40:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-12T04:56:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.berg-software.com\/wp-content\/uploads\/Evolution-22remote-work22-Google-Trends.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@berg_software\" \/>\n<meta name=\"twitter:site\" content=\"@berg_software\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"16 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.berg-software.com\/en\/#organization\",\"name\":\"Berg Software\",\"url\":\"https:\/\/www.berg-software.com\/en\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/bergCOMPUTERS\/\",\"https:\/\/www.instagram.com\/berg_software\/\",\"https:\/\/www.linkedin.com\/company\/berg-computers-srl\/\",\"https:\/\/www.youtube.com\/channel\/UCw1FfcRJnC-CoKPwlcM10Iw\",\"https:\/\/twitter.com\/berg_software\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.berg-software.com\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/berg-software.com\/wp-content\/uploads\/berg-software-logo.png\",\"contentUrl\":\"https:\/\/berg-software.com\/wp-content\/uploads\/berg-software-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Berg Software\"},\"image\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.berg-software.com\/en\/#website\",\"url\":\"https:\/\/www.berg-software.com\/en\/\",\"name\":\"Berg Software\",\"description\":\"We turn ideas into software.\",\"publisher\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.berg-software.com\/en\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.berg-software.com\/wp-content\/uploads\/Evolution-22remote-work22-Google-Trends.jpg\",\"contentUrl\":\"https:\/\/www.berg-software.com\/wp-content\/uploads\/Evolution-22remote-work22-Google-Trends.jpg\",\"width\":2304,\"height\":1536},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#webpage\",\"url\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/\",\"name\":\"How to: Secure remote work | Berg Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#primaryimage\"},\"datePublished\":\"2020-07-29T03:40:13+00:00\",\"dateModified\":\"2020-08-12T04:56:59+00:00\",\"description\":\"Secure remote work is a basic \\\"must have\\\" of software outsourcing. We identify security-related challenges of remote work and describe several solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.berg-software.com\/en\/\",\"url\":\"https:\/\/www.berg-software.com\/en\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.berg-software.com\/en\/category\/insights\/\",\"url\":\"https:\/\/www.berg-software.com\/en\/category\/insights\/\",\"name\":\"Insights\"}},{\"@type\":\"ListItem\",\"position\":3,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/\",\"url\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/\",\"name\":\"How to: Secure remote work\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/#\/schema\/person\/5063ecc91b2d90d495a8718d8cd41830\"},\"headline\":\"How to: Secure remote work\",\"datePublished\":\"2020-07-29T03:40:13+00:00\",\"dateModified\":\"2020-08-12T04:56:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.berg-software.com\/en\/secure-remote-work\/#primaryimage\"},\"articleSection\":\"How to,Insights\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.berg-software.com\/en\/#\/schema\/person\/5063ecc91b2d90d495a8718d8cd41830\",\"name\":\"Berg Software\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/posts\/4531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/comments?post=4531"}],"version-history":[{"count":0,"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/posts\/4531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/media\/4554"}],"wp:attachment":[{"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/media?parent=4531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/categories?post=4531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.berg-software.com\/en\/wp-json\/wp\/v2\/tags?post=4531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}