- Home Office Security – Never Too Late to Evaluate by firstname.lastname@example.org (John Allegro) on October 8, 2020
We are past the point of whether or not working remotely, or from home, is something we are unsure of. For some of us, it is likely our permanent setup. For others, it is a long situation that we need to move forward with in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity.While you might still use the dining room or coffee table as a desk, the physical setup is not as important as the unseen security features that connect the home to the business network. Cybersecurity needs to be top-notch and if it has not yet been addressed, now is the time.While theft isn’t something you plan on, it can occur. Your laptop, or desktop, and mobile phone can be vulnerable to theft when left unattended. Make sure these devices are set to lock or better yet, shut down when you leave them. This is obviously more important if you have roommates or small children around, but not to be overlooked if you live alone. If you are working in a shared space of the house, move the devices at the end of the day to a location that is safe and out of sight.The access that your device provides also should be reviewed, especially if you are using a personal device. Are your passwords shared across accounts? If so, change them. Ensure that file sharing is turned off if you are on the home network. Encryption and multi-factor authentication (MFA) are essential security features that your organization must offer to remote workers. If you do not have access to a single sign-on, consider using a password manager that is coupled with biometrics and/or MFA.A VPN with encryption is something that should be setup. Additional layers of security that apply to your home Wi-Fi should be set up, and never leave the default password for any device!Instituting a comprehensive security posture may seem like an arduous process. The good news is that it can be done with the right tools and help. We can help you to get started with a security risk assessment to uncover the gaps in your program. Contact us today for more information.
- 3 Vulnerabilities Associated With Remote Access by email@example.com (John Allegro) on August 13, 2020
Over the last several years, the attack surface of today’s business networks has widened dramatically. The reasons? A rush of mobile devices flooded business networks, a growing population of increasingly ambitious and sophisticated hackers, and, particular to our interest, the explosive growth of remote work.
- Top 5 Security Features of Cisco AnyConnect by firstname.lastname@example.org (John Allegro) on August 13, 2020
As more companies settle into remote work for the long haul, either by allowing employees to work from home indefinitely or by deploying a flexible, part-time remote model, it’s important to not get lax on security. Remote workers need tools to stay secure wherever they work from, and using a VPN on its own might not be enough.