{"id":4170,"date":"2024-08-27T11:30:40","date_gmt":"2024-08-27T09:30:40","guid":{"rendered":"https:\/\/blog.wscad.com\/?p=4170"},"modified":"2026-04-16T10:34:38","modified_gmt":"2026-04-16T08:34:38","slug":"remote-work-and-data-security","status":"publish","type":"post","link":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/","title":{"rendered":"Remote work and data security: efficient and secure engineering from anywhere"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_margin=&#8221;-20px&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]<strong>Whether regularly working from home or occasionally travelling on business, mobile working has become firmly established in many companies. However, in addition to the major benefits such as greater flexibility, there are also challenges, particularly in terms of data security and secure working. In this article, we show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how <a href=\"#wscad-remote-work\">WSCAD supports secure decentralised working<\/a>.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Establishing security guidelines<\/h3>\n<p>An unwanted outflow of information is one of the biggest security risks. Companies should therefore define clear security guidelines:<\/p>\n<ul class=\"gelbe_bulletpointliste\" style=\"margin-bottom: 0 !important;\">\n<li>What information may be transported and processed outside the company?<\/li>\n<li>Who is authorised to take this information with them?<\/li>\n<li>How is this information protected?<\/li>\n<li>Which means of communication may be used for mobile working and under what conditions?<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Raising employee awareness<\/h3>\n<p>Security guidelines are ineffective if they are not followed. Therefore, sensitising employees is essential. Train employees in the security guidelines. Emphasise the value of data and the dangers of inappropriate handling of information and point out the risks involved in the careless transport and destruction of data.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Access and access protection<\/h3>\n<p>Infrastructural security is not the same for mobile working as it is for in-house offices. It is therefore important to take measures to protect against burglary and access.<\/p>\n<p>These include<\/p>\n<ul class=\"gelbe_bulletpointliste\" style=\"margin-top: -16px !important; margin-bottom: 0 !important;\">\n<li>lockable rooms or at least roller containers for the secure storage of work equipment and information.<\/li>\n<li>the use of screen protectors to protect against &#8220;shoulder surfing&#8221;, i.e. spying on information by &#8220;looking over your shoulder&#8221;.<\/li>\n<li>tidying up the home workplace after work<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Encryption of IT systems and data carriers<\/h3>\n<p>It is often easier for attackers to access confidential information when working remotely. It is therefore essential that portable IT systems and data carriers are encrypted.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Secure remote access to the company network<\/h3>\n<p>Cryptographically secured virtual private networks (VPNs) offer secure access to company networks and data, even when accessed via external networks. However, not all external networks are the same (private WIFI vs. public WIFI in caf\u00e9s, in the city, etc.). Companies should therefore develop rules and trainings for dealing with external IT networks in order to minimise risks.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Regular data backups<\/h3>\n<p>Data can be lost due to falls, climatic conditions or simply leaving data carriers lying around. Regular data backups, which are also stored in the company, are therefore extremely important. The loss of data carriers should be reported promptly to the company so that it can react to risks in good time.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;3%&#8221; bottom_margin=&#8221;0&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Correct data disposal<\/h3>\n<p>The correct, secure disposal of data is just as important as protecting it. Confidential information \u2013 no matter if printed or on a data carrier &#8211; should therefore not simply be disposed of with household waste or in a hotel, etc. Before disposal, the data must be checked for its level of confidentiality and, depending on this, securely destroyed within the company.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;wscad-remote-work&#8221; advanced_gradient=&#8221;linear-gradient(12deg, rgb(16,38,59) 50%, rgb(1,93,156) 90%)&#8221; advanced_gradient_angle=&#8221;12&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;advanced&#8221; shape_type=&#8221;&#8221; advanced_gradient_display_type=&#8221;linear&#8221;][vc_column top_padding_desktop=&#8221;12&#8243; bottom_padding_desktop=&#8221;12&#8243; left_padding_desktop=&#8221;20&#8243; right_padding_desktop=&#8221;20&#8243; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; column_padding_type=&#8221;advanced&#8221; gradient_type=&#8221;default&#8221;][vc_column_text]\n<h2>Remote work: secure engineering with WSCAD<\/h2>\n[\/vc_column_text][vc_column_text]Home office or mobile working: enjoy full data security from everywhere with the E-CAD solution from WSCAD. It&#8217;s so simple![\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h3>Local network licenses<\/h3>\n<p>WSCAD software is used via network licenses, which are normally located on the company server. For mobile working or working from home, however, the licenses can be borrowed and stored locally on the user&#8217;s computer. One security advantage is, that no constant Internet connection is required. This improves your level of security especially when travelling on business, as no insecure networks need to be used. And even if the laptop is lost (theft or similar), the borrowed licence remains with the company: once the loan period has expired, the borrowed license is back on the company server.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Locally installed software &#8211; decentralised data:<\/h3>\n<p>Data is the gold of the Internet and should therefore be well protected. With WSCAD, the software can be installed locally and the data can be accessed in the company network via a secure VPN connection. In the case of insecure networks, the required data can be temporarily stored locally and later returned to the company network. This allows a flexible response depending on the security situation.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#f2f2f2&#8243; scene_position=&#8221;center&#8221; top_padding=&#8221;20&#8243; bottom_padding=&#8221;20&#8243; left_padding_desktop=&#8221;20&#8243; right_padding_desktop=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1711625993305{padding-top: 20px !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;.vc_custom_1776328471012{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221; text_direction=&#8221;default&#8221;]<strong>Discover rocket-fast and safe engineering for your company with WSCAD ELECTRIX ROCKET!<\/strong><\/p>\n<p>Hackers, data thieves, corporate spies? No need to worry about them if you use WSCAD ELECTRIX for your engineering. Your data is safe here, regardless of whether you work from home, mobile or in the office. Secure your appropriate network licenses for the ELECTRIX software now![\/vc_column_text][nectar_btn size=&#8221;large&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Extra-Color-1&#8243; solid_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;fontawesome&#8221; text=&#8221;Request a non-binding offer now&#8221; url=&#8221;https:\/\/www.wscad.com\/en\/contact\/?wsc_subject_contact_basic_en=contact_basic_offer&#8221; icon_fontawesome=&#8221;fa fa-play&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;4012&#8243; image_size=&#8221;full&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; img_link=&#8221;https:\/\/www.wscad.com\/electrix\/demo\/&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; bottom_padding=&#8221;40&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Conclusion: remote working requires data security<\/h3>\n<p><strong>Advancing digitalisation and the increasing prevalence of working from home and mobile working present companies with new challenges, particularly in the area of data security. It is essential to draw up comprehensive security guidelines and sensitise employees accordingly. Protecting access and using encrypted systems are just as important as regular data backups and correct data disposal. Companies that consistently implement security measures can take full advantage of the benefits of mobile working without jeopardising the security of their sensitive information.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#f2f2f2&#8243; scene_position=&#8221;center&#8221; top_padding=&#8221;20&#8243; bottom_padding=&#8221;20&#8243; left_padding_desktop=&#8221;20&#8243; right_padding_desktop=&#8221;20&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; disable_element=&#8221;yes&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bottom_padding=&#8221;20&#8243; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1711626086471{margin-bottom: 0px !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; column_padding_type=&#8221;default&#8221; gradient_type=&#8221;default&#8221;][vc_column_text]\n<h5>Sie m\u00f6chten eine Lizenz f\u00fcr WSCAD ELECTRIX Cabinet Engineering oder das Add-On Cabinet Expert zu Ihrer bestehenden Lizenz hinzuf\u00fcgen?<\/h5>\n<p><strong>Unser Team ber\u00e4t Sie gerne!<a href=\"https:\/\/www.wscad.com\/kontakt\/?wsc_subject_contact_basic_de=Beratung%20zu%20WSCAD%20Produkten\" target=\"_blank\" rel=\"noopener\"> Nehmen Sie noch heute Kontakt auf!<\/a><\/strong>[\/vc_column_text][nectar_btn size=&#8221;large&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Extra-Color-1&#8243; solid_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;fontawesome&#8221; text=&#8221;Jetzt Angebot anfragen&#8221; url=&#8221;https:\/\/www.wscad.com\/kontakt\/?wsc_subject_contact_basic_de=Beratung%20zu%20WSCAD%20Produkten&#8221; icon_fontawesome=&#8221;fa fa-play&#8221; margin_top=&#8221;20&#8243; margin_bottom=&#8221;0&#8243;][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;Full Width Line&#8221; line_thickness=&#8221;1&#8243; divider_color=&#8221;default&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1711625993305{padding-top: 20px !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;.vc_custom_1711626283542{margin-top: 20px !important;margin-bottom: 20px !important;}&#8221;]<b>Sie kennen die WSCAD E-CAD-Software ELECTRIX noch nicht?<\/b><br \/>\nTesten Sie jetzt kostenlos und unverbindlich die komplette ELECTRIX ROCKET Ultimate mit allen Modulen und Add-Ons. ELECTRIX ROCKET setzt neue Ma\u00dfst\u00e4be in der Leistungsf\u00e4higkeit: die raketenstarke, neue Version unserer intuitiven E-CAD-Software WSCAD ELECTRIX ist <span style=\"text-decoration: underline;\">bis zu 100% schneller als die WSCAD SUITE X PLUS<\/span>![\/vc_column_text][nectar_btn size=&#8221;large&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Extra-Color-1&#8243; solid_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;fontawesome&#8221; text=&#8221;ELECTRIX jetzt kostenfrei testen!&#8221; url=&#8221;https:\/\/www.wscad.com\/electrix\/demo\/&#8221; icon_fontawesome=&#8221;fa fa-play&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;4012&#8243; image_size=&#8221;full&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.<\/p>\n","protected":false},"author":22,"featured_media":4173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[280],"tags":[],"class_list":{"0":"post-4170","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-general"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Remote work and data security: efficient and secure engineering from anywhere | WSCAD-BLOG<\/title>\n<meta name=\"description\" content=\"We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote work and data security: efficient and secure engineering from anywhere | WSCAD-BLOG\" \/>\n<meta property=\"og:description\" content=\"We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"WSCAD-BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-27T09:30:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T08:34:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexander Vell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\"},\"author\":{\"name\":\"Alexander Vell\",\"@id\":\"https:\/\/blog.wscad.com\/#\/schema\/person\/07867e5e2262ed3f3e5388dc4082ec05\"},\"headline\":\"Remote work and data security: efficient and secure engineering from anywhere\",\"datePublished\":\"2024-08-27T09:30:40+00:00\",\"dateModified\":\"2026-04-16T08:34:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\"},\"wordCount\":4222,\"publisher\":{\"@id\":\"https:\/\/blog.wscad.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\",\"url\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\",\"name\":\"Remote work and data security: efficient and secure engineering from anywhere | WSCAD-BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wscad.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg\",\"datePublished\":\"2024-08-27T09:30:40+00:00\",\"dateModified\":\"2026-04-16T08:34:38+00:00\",\"description\":\"We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage\",\"url\":\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg\",\"contentUrl\":\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg\",\"width\":920,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/blog.wscad.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General\",\"item\":\"https:\/\/blog.wscad.com\/en\/category\/general\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Remote work and data security: efficient and secure engineering from anywhere\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wscad.com\/#website\",\"url\":\"https:\/\/blog.wscad.com\/\",\"name\":\"WSCAD Blog\",\"description\":\"WSCAD\",\"publisher\":{\"@id\":\"https:\/\/blog.wscad.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wscad.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wscad.com\/#organization\",\"name\":\"WSCAD GmbH\",\"alternateName\":\"WSCAD E-CAD-Software\",\"url\":\"https:\/\/blog.wscad.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wscad.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2016\/11\/Logo_pos.png\",\"contentUrl\":\"https:\/\/blog.wscad.com\/wp-content\/uploads\/2016\/11\/Logo_pos.png\",\"width\":500,\"height\":140,\"caption\":\"WSCAD GmbH\"},\"image\":{\"@id\":\"https:\/\/blog.wscad.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/2940832\/admin\/feed\/posts\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wscad.com\/#\/schema\/person\/07867e5e2262ed3f3e5388dc4082ec05\",\"name\":\"Alexander Vell\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote work and data security: efficient and secure engineering from anywhere | WSCAD-BLOG","description":"We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Remote work and data security: efficient and secure engineering from anywhere | WSCAD-BLOG","og_description":"We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.","og_url":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/","og_site_name":"WSCAD-BLOG","article_published_time":"2024-08-27T09:30:40+00:00","article_modified_time":"2026-04-16T08:34:38+00:00","og_image":[{"width":920,"height":510,"url":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg","type":"image\/jpeg"}],"author":"Alexander Vell","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#article","isPartOf":{"@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/"},"author":{"name":"Alexander Vell","@id":"https:\/\/blog.wscad.com\/#\/schema\/person\/07867e5e2262ed3f3e5388dc4082ec05"},"headline":"Remote work and data security: efficient and secure engineering from anywhere","datePublished":"2024-08-27T09:30:40+00:00","dateModified":"2026-04-16T08:34:38+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/"},"wordCount":4222,"publisher":{"@id":"https:\/\/blog.wscad.com\/#organization"},"image":{"@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/","url":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/","name":"Remote work and data security: efficient and secure engineering from anywhere | WSCAD-BLOG","isPartOf":{"@id":"https:\/\/blog.wscad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg","datePublished":"2024-08-27T09:30:40+00:00","dateModified":"2026-04-16T08:34:38+00:00","description":"We show what advices the German Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI) gives on secure mobile working and how WSCAD supports secure decentralised working.","breadcrumb":{"@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#primaryimage","url":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg","contentUrl":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2024\/08\/Blog_Beitragsbild_HomeOffice-Datenschutz_1000x563.jpg","width":920,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wscad.com\/en\/remote-work-and-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.wscad.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"General","item":"https:\/\/blog.wscad.com\/en\/category\/general\/"},{"@type":"ListItem","position":3,"name":"Remote work and data security: efficient and secure engineering from anywhere"}]},{"@type":"WebSite","@id":"https:\/\/blog.wscad.com\/#website","url":"https:\/\/blog.wscad.com\/","name":"WSCAD Blog","description":"WSCAD","publisher":{"@id":"https:\/\/blog.wscad.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wscad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wscad.com\/#organization","name":"WSCAD GmbH","alternateName":"WSCAD E-CAD-Software","url":"https:\/\/blog.wscad.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wscad.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2016\/11\/Logo_pos.png","contentUrl":"https:\/\/blog.wscad.com\/wp-content\/uploads\/2016\/11\/Logo_pos.png","width":500,"height":140,"caption":"WSCAD GmbH"},"image":{"@id":"https:\/\/blog.wscad.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/2940832\/admin\/feed\/posts\/"]},{"@type":"Person","@id":"https:\/\/blog.wscad.com\/#\/schema\/person\/07867e5e2262ed3f3e5388dc4082ec05","name":"Alexander Vell"}]}},"_links":{"self":[{"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/posts\/4170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/comments?post=4170"}],"version-history":[{"count":3,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/posts\/4170\/revisions"}],"predecessor-version":[{"id":4777,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/posts\/4170\/revisions\/4777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/media\/4173"}],"wp:attachment":[{"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/media?parent=4170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/categories?post=4170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wscad.com\/en\/wp-json\/wp\/v2\/tags?post=4170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}