6 Quick Cybersecurity Must-Haves to Support a Remote Workforce
By Steve Cobb, CISO, One Source
As the Coronavirus dilemma begins to affect all aspects of our professional and personal lives, many companies are encouraging their workforce to work remotely. This can be a great method of exercising “social distance”, but it can also greatly increase your companies’ risk to cyber threats. One Source has seen a sharp rise in phishing credential stealing and vulnerability exploitation attempts related to the virus and its affects. Here are some quick security tips to consider as your employees start to move to a remote workforce. These tips are geared to the small enterprise and mid-market companies that might not have the infrastructure, skills, or resources to already have measures in place.
- Enforce MFA on ALL corporate websites and access, including O365 and VPN
Do this now! Like stop reading this and go turn this on right now!!! As users begin to leverage public websites to perform their daily duties, threat actors are going to ramp up efforts to steal credentials from your employees that they can then use to log into those sites.
- DO NOT allow RDP through your firewalls.
It might seem convenient to just enable RDP through your firewall, but this is a sure way to get compromised. If this is your only option, then make sure that firewall rules are tied to specific external IPs and specific internal IPs and use non default ports.
- Enforce an EDR product on ALL computers that connect to your corporate network
It is extremely risky and not recommended to allow employees’ personal computers to connect to your corporate network via VPN. If you must do this, make sure that all those endpoints are running the endpoint security product of your choice. It needs to be more advanced than just an anti-virus client.
- Patch your endpoints
Make sure that endpoints used to access the corporate network are patched for the OS and any 3rd party applications.
- Enforce good password policies
All employees that may be accessing the corporate network, locally or remotely, should be forced to use good password policies like complex passwords, adequate password change frequency, etc.
- Monitor bandwidth and license usage
We normally include availability and resiliency in our security discussions, so consider the logistics of your workforce moving to remote locations and what impact that has on bandwidth, licenses, and support. Overlooking these possible saturation points could affect the entire workforce.
These tips will greatly increase your security program as more and more employees move to remote work. If you have any questions, don’t hesitate to reach out to our team for more information.
One Source is here to help you protect and defend your business with best-practices and personal consultation.
Contact us at (877) 651-1650.
- Buying UCaaS/CCaaS: If You Don't Evaluate Beyond Features You Could Be Making a BIG Mistake
Oct 31, 2023
- Is BYOD Easier Than Corporate Mobile Management?
Sep 29, 2023
- Enhancing Customer Experience with CCaaS: A Guide for IT Leaders
May 22, 2023
- Implementing UCaaS: Best Practices
Apr 25, 2023
- Top Considerations for Choosing a UCaaS Provider
Apr 20, 2023
- What is UCaaS, and does your company need it?
Apr 12, 2023
- How To Recover Telecom Costs And Fuel 2023 IT Budget
Dec 30, 2022
- Recommendations to Navigate the Complexities of Cybersecurity Insurance
Jul 29, 2022
- Steps to Guard Against Russian Cyber Attacks
Jun 20, 2022
- How to Prepare Your Network for Cloud Transformation
Apr 22, 2022
- How To Get More Out Of Your 2022 IT Budget
Feb 2, 2022
- SD-WAN vs. MPLS: What You Need To Consider For Your Organizations Network
Dec 16, 2021
- Why Shadow IT Opens the Door to Cybersecurity Risks
Oct 28, 2021
- What is Shadow IT?
Oct 7, 2021
- POTS Replacement – Waiting Is No Longer An Option
Sep 9, 2021