WORKING FROM HOME – REMOTE-ACCESS SECURITY CHECKLIST

When societal disruption occurs, enabling a work-from-home option is essential for business continuity. But in the effort to keep workers productive and the business running, hastily extending a remote work option can leave your organization vulnerable in terms of security. If there’s one thing we know about cybercriminals, it’s that they don’t hesitate to jump on opportunities. Use this step-by-step checklist to assist in protecting your workforce regardless of location.

Button-down your password policies

If you’ve been lax here, now’s the time to ratchet down your policies. Require long passwords (or better still, passphrases); mandate regular changes and lockout accounts after a set number of failed logins. Reinforce to employees that they can’t re-use their work passwords for any of their personal logins.

Require multi-factor authentication (MFA)

Also known as two-factor authentication (2FA), this is absolutely your best defense against cyber crooks using brute-force techniques, password-spraying or stolen credentials purchased on the dark web to masquerade as employees and infiltrate your network. If you use cloud-based email, productivity suites or other applications, if MFA is available, turn it on. If users need to access your internal network, put an MFA solution in place.

Require a VPN for accessing your internal network

A VPN encrypts your corporate traffic as it traverses the public internet so it can’t be read by eavesdroppers. As a plus, a VPN connection allows your IT team to extend more of your internal-network security measures to remote devices. Get a VPN. If you already are using a VPN for some workers, make sure you have enough licenses and the capacity to cover the new users. If employees will be accessing resources on your internal network, the combination of a VPN and MFA is a must.

Use a virtual desktop interface solution if possible

With this type of solution, the employee accesses a virtual machine that is either in the cloud or your data center and controls it remotely. It can be configured to look exactly like an office-based system. The advantage is the sensitive data or files exist only on the virtual machine and are never resident on the employee’s home system.

Remind workers to be network-aware and Wi-Fi wary

One thing that’s completely out of your control is their home network and other devices that connect to it. Tell them to turn off any file-sharing on the system they’ll be using for work and to check their home router or Wi-Fi access point to be sure that WPA2 security is enabled. Remind them never to connect to an unsecured or open Wi-Fi access point that doesn’t require a security key.

Invest in full-featured endpoint security for home workers

You can’t trust that the antivirus that shipped with a home system or personal device is up to the job. A full-featured solution guards against all manner of threats with multiple layers of defense including a personal firewall, protection from malicious websites, and guarding against malware on portable USB drives. The best option here is a business-class endpoint security suite that your IT department can administer remotely.

Require encryption if employees will work on sensitive files

If employees will be downloading corporate files to their personal devices, provide them with an encryption solution. Insist that they keep their personal files separate from the corporate documents, and save the corporate documents to an encrypted folder. Also, enforce a policy that they save revised documents to the corporate data store, so you don’t have to worry about remote backup.

Instill the habit of logging out

When they’re taking their lunch break, they are done for the day or anytime they’re away from their device for more than a minute or two, they should log out from the corporate network. It’s good practice anytime. It’s a must if the computer is shared, or if others in the home can access it.

Previous
Previous

DESPISE YOUR HOME NETWORK WIFI – LET’S FIXIT

Next
Next

FAMILY CAREGIVERS ARE CUED INTO TECHNOLOGY