Close the Security Gaps of a Remote Workforce | From itopia.com

 Close the Security Gaps of a Remote Workforce : The steps companies should take to ensure secure access when enabling employees to work from home

Dan Lohrmann Chief Strategist & Chief Security Officer at Security Mentor Jonathan Lieberman CEO and Co-founder, itopia

Richard Stiennon Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’ Scott Schober Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’

Tim Crawford CIO Strategic Adviser, AVOA Tyler Carbone Chief Strategy Officer of Terbium Labs Jamie Zajac VP of Product Management, Carbonite + Webroot, OpenText Companies

 

The Covid-19 pandemic has rearranged life and business as we know it. Companies across the globe have had to quickly stand up remote work environments.

How can organizations tighten the security gaps of new and existing remote workers? Experts share their insights:

“Preparing for remote work provides an excellent opportunity to train employees on proper security hygiene, and it benefits them as well as their companies.” - Tyler Carbone, Chief Strategy Officer of Terbium Labs

“Guidelines should be developed and shared with all workers before anyone begins to work remotely.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’

“Management needs to begin by clearly defining which employees have access from a remote location and what specific network protocols are to be used.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’

Establish Processes Utilize a Secure Cloud Secure Devices & Technology Protect Against Cyber Threats Automate Automate Automate

“By equipping the workforce with secure, remote desktops in the cloud organizations ensure that the workforce remains secure and productive.” - Jonathan Lieberman, CEO and Co-founder, itopia

“Get identity right. Deploy a cloud directory service.” - Richard Stiennon, Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’

“Replace VPNs with SASE, a cloud proxy that replicates the data center security stack for web filtering, malware defense, and DLP.” - Richard Stiennon, Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’

“Use a VPN to connect back to the corporate network for corporate-specific data. Do not backhaul Internet traffic across the VPN to avoid performance issues.” - Tim Crawford, CIO Strategic Adviser, AVOA

“Support remote workers with reliable internet access.” - Richard Stiennon, Author of ‘Security Yearbook 2020: A History and Directory of the IT Security Industry’

“Make sure that their home network is setup with a good router and it has its firewall enabled and the default password has been changed.” - Tim Crawford, CIO Strategic Adviser, AVOA

“Routers should be hardened for security including using the strongest WiFi encryption available.” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor

“Make sure that the computer they are using is fully patched with virus protection and firewall enabled.” - Tim Crawford, CIO Strategic Adviser, AVOA

“A lot of focus is put on the predict, prevent, detect and respond buckets. But don’t forget about recover. Have a data protection strategy in place that helps ensure compliance and reduces downtime no matter where your employees are working.” - Jamie Zajac, VP of Product Management, Carbonite + Webroot, OpenText Companies

“Identify packet sniffers to detect potential root compromises. Cybercriminals will often use packet sniffers to collect login credentials and metadata from a company.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’

“Require all employees to use 2FA (Two-factor Authentication) as this added layer of security can increase security ten-fold.” - Scott Schober, Author of ‘Hacked Again’ & ‘Cybersecurity is Everybody’s Business’

“Enable full device encryption, if sensitive data or communications will be on the device.” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor

“Disable unnecessary or risky services and do not connect unknown devices to the system.” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor

"Businesses must automate every aspect of their remote worker environments including the enforcement of security policies and file share permissions.” - Jonathan Lieberman, CEO and Co-founder, itopia

“Automatically update operating system software and application software (e.g. anti- malware software, office productivity).” - Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor

Originally published: https://www.slideshare.net/jlieberman07/close-the-security-gaps-of-a-remote-workforce-232732850

More reads: https://www.itopia.com/how-to-prepare-for-a-remote-workforce-our-new-normal/

May 7, 2020
Subscribe
Notify of
guest
The comment form collects your name, email and content to allow us keep track of the comments placed on the website. Please read and accept our website Terms and Privacy Policy to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center

Necessary

Cookies that are necessary for the site to function properly. This includes, storing the user's cookie consent state for the current domain, managing users carts to using the content network, Cloudflare, to identify trusted web traffic. See full Cookies declaration

gdpr, PYPF, woocommerce_cart_hash, woocommerce_items_in_cart, _wp_wocommerce_session, __cfduid [x2]

Performance

These are used to track user interaction and detect potential problems. These help us improve our services by providing analytical data on how users use this site.

_global_lucky_opt_out, _lo_np_, _lo_cid, _lo_uid, _lo_rid, _lo_v, __lotr
_ga, _gid, _gat, __utma, __utmt, __utmb, __utmc, __utmz
vuid

Marketing


tr, fr
ads/ga-audiences