The Covid-19 pandemic demanded that businesses immediately shift to remote work environments. The quick shift however, may have created security gaps. Cyber security experts and IT executives steps companies should take to ensure secure access to sensitive corporate data when enabling employees to work from home.
Let us help you stand up a secure remote work environments in 24 hours! https://bit.ly/2ScpL22
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Close the Security Gaps of a Remote Workforce
1. Close the Security Gaps
of a Remote Workforce
The steps companies should take to ensure secure
access when enabling employees to work from home
2. Dan Lohrmann
Chief Strategist &
Chief Security Officer
at Security Mentor
Jonathan Lieberman
CEO and Co-founder,
itopia
Richard Stiennon
Author of ‘Security
Yearbook 2020: A
History and Directory
of the IT Security
Industry’
Scott Schober
Author of ‘Hacked
Again’ & ‘Cybersecurity
is Everybody’s
Business’
Tim Crawford
CIO Strategic Adviser,
AVOA
Tyler Carbone
Chief Strategy Officer
of Terbium Labs
Jamie Zajac
VP of Product
Management,
Carbonite + Webroot,
OpenText Companies
3. The Covid-19 pandemic has rearranged life
and business as we know it. Companies
across the globe have had to quickly stand
up remote work environments.
4. How can organizations tighten the security
gaps of new and existing remote workers?
Experts share their insights:
5. Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
6. “Preparing for remote work provides an
excellent opportunity to train employees
on proper security hygiene, and it benefits
them as well as their companies.”
- Tyler Carbone, Chief Strategy Officer
of Terbium Labs
7. “Guidelines should be developed
and shared with all workers before
anyone begins to work remotely.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
8. “Management needs to begin by clearly
defining which employees have access
from a remote location and what specific
network protocols are to be used.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
9. Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
10. “By equipping the workforce with secure, remote
desktops in the cloud organizations ensure that
the workforce remains secure and productive.”
- Jonathan Lieberman, CEO and Co-founder, itopia
11. “Get identity right.
Deploy a cloud directory service.”
- Richard Stiennon, Author of ‘Security Yearbook 2020:
A History and Directory of the IT Security Industry’
12. “Replace VPNs with SASE, a cloud proxy
that replicates the data center security stack
for web filtering, malware defense, and DLP.”
- Richard Stiennon, Author of ‘Security Yearbook 2020:
A History and Directory of the IT Security Industry’
13. Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
14. “Use a VPN to connect back to the
corporate network for corporate-specific
data. Do not backhaul Internet traffic across
the VPN to avoid performance issues.”
- Tim Crawford, CIO Strategic Adviser, AVOA
15. “Support remote workers
with reliable internet access.”
- Richard Stiennon, Author of ‘Security Yearbook 2020:
A History and Directory of the IT Security Industry’
16. “Make sure that their home network
is setup with a good router and it has
its firewall enabled and the default
password has been changed.”
- Tim Crawford, CIO Strategic Adviser, AVOA
17. “Routers should be hardened for
security including using the strongest
WiFi encryption available.”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
18. “Make sure that the computer they
are using is fully patched with virus
protection and firewall enabled.”
- Tim Crawford, CIO Strategic Adviser, AVOA
19. Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
20. “A lot of focus is put on the predict, prevent, detect
and respond buckets. But don’t forget about recover.
Have a data protection strategy in place that helps
ensure compliance and reduces downtime no
matter where your employees are working.”
- Jamie Zajac, VP of Product Management,
Carbonite + Webroot, OpenText Companies
21. “Identify packet sniffers to detect potential
root compromises. Cybercriminals will often
use packet sniffers to collect login credentials
and metadata from a company.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
22. “Require all employees to use 2FA
(Two-factor Authentication) as this added layer
of security can increase security ten-fold.”
- Scott Schober, Author of ‘Hacked Again’ &
‘Cybersecurity is Everybody’s Business’
23. “Enable full device encryption, if sensitive data
or communications will be on the device.”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
24. “Disable unnecessary or risky services and do
not connect unknown devices to the system.”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
25. Establish Processes
Utilize a Secure Cloud
Secure Devices & Technology
Protect Against Cyber Threats
Automate Automate Automate
26. “Businesses must automate every aspect
of their remote worker environments
including the enforcement of security
policies and file share permissions.”
- Jonathan Lieberman, CEO and Co-founder, itopia
27. “Automatically update operating system
software and application software (e.g. anti-
malware software, office productivity).”
- Dan Lohrmann, Chief Strategist &
Chief Security Officer at Security Mentor
28. Learn more about setting up and securing
your remote workforce at itopia.com