BBH Blog The latest news surrounding Managed Services, IT Solutions, and resources.
- Why Regional Bank Compliance Requires SOC 2 Vendor Management by email@example.com (John Allegro) on January 19, 2021
As technological advances break their way into financial institutions, a need for enhanced security protocols has surfaced. Businesses and clients alike need a way to verify that the information they collect and provide is being stored and accessed securely to prevent data breaches like the ones that took place at Capital One, Equifax and First American Financial.
- BBH Solutions Statement on the Solarwinds Breach by firstname.lastname@example.org (John Allegro) on January 15, 2021
- Home Office Security – Never Too Late to Evaluate by email@example.com (John Allegro) on October 8, 2020
We are past the point of whether or not working remotely, or from home, is something we are unsure of. For some of us, it is likely our permanent setup. For others, it is a long situation that we need to move forward with in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity.While you might still use the dining room or coffee table as a desk, the physical setup is not as important as the unseen security features that connect the home to the business network. Cybersecurity needs to be top-notch and if it has not yet been addressed, now is the time.While theft isn’t something you plan on, it can occur. Your laptop, or desktop, and mobile phone can be vulnerable to theft when left unattended. Make sure these devices are set to lock or better yet, shut down when you leave them. This is obviously more important if you have roommates or small children around, but not to be overlooked if you live alone. If you are working in a shared space of the house, move the devices at the end of the day to a location that is safe and out of sight.The access that your device provides also should be reviewed, especially if you are using a personal device. Are your passwords shared across accounts? If so, change them. Ensure that file sharing is turned off if you are on the home network. Encryption and multi-factor authentication (MFA) are essential security features that your organization must offer to remote workers. If you do not have access to a single sign-on, consider using a password manager that is coupled with biometrics and/or MFA.A VPN with encryption is something that should be setup. Additional layers of security that apply to your home Wi-Fi should be set up, and never leave the default password for any device!Instituting a comprehensive security posture may seem like an arduous process. The good news is that it can be done with the right tools and help. We can help you to get started with a security risk assessment to uncover the gaps in your program. Contact us today for more information.