Life goes on, and business must go on as generally as possible.
When we usually talk about business continuity, we think of two types of risks:
But now also, we know that we must be prepared before
That’s right, and we have no choice. Due to responsibility and social collaboration, we must lock ourselves in and continue giving the best of each of us because, as we say, life goes on, and businesses and public services must continue to be active as far as possible.
Therefore, the recipe is straightforward: Teleworking. Both for employees of private companies and those of the administration or public sector entities. Virtually all office jobs become remote jobs.
Thousands, perhaps millions, of companies and administrations are forced to integrate teleworking into their corporate DNA to continue offering their services.
Also Read: Experimentation to the Success of Artificial Intelligence
This implies deploying, in many cases against the clock, remote workstations, which means opening new accesses to the system so that everyone from home can follow their work and their daily chores from their new Workspace at home.
But be careful because the situation’s urgency cannot reduce the security of the environment or compromise the information and data of the business. Despite massive and urgent deployments of remote jobs, they must be controlled and safe deployments.
We must keep the perimeter security of the technological infrastructure active and protect data that, in case of infection or disaster, allows us to recover them and continue working with the minor loss of time and data.
At Enetic, we have designed a protocol of 5 actions to maximise the express deployment of teleworking or remote work positions.
To add our grain of sand and collaborate with the business fabric, we share this protocol with you so that the massive adoption of teleworking does not represent an opportunity in cybercrime.
Work devices and equipment may change overnight due to the implementation of teleworking. Sometimes employees will start working on their PCs or laptops, which must be secure. For this, it is necessary to carry out a preliminary scan in search of malware or other malicious software and install the corporate antivirus on the new work computers. Solutions like ESET, Kaspersky or Carbon Black may be suitable.
We will give access to the system and the environment’s resources to new devices and equipment, but this should not limit the action of the Firewall or Firewall solutions. It will be necessary to keep perimeter security active, enable secure remote access through VPN solutions, integrate with domain controller users and properly configure the firewall policy so that access to the environment is restricted to what is strictly necessary. WatchGuard, SonicWall, Fortinet and other Firewall providers integrate VPN solutions to establish secure connections.
Desktop virtualization technologies make secure remote connection simple and easy. We recommend establishing connections between the terminals and the servers through the RDP protocol. In the case of not having virtualized desktop sessions, the windows broker service can deploy the Windows Broker service to manage that each user connects to their computer in a controlled manner.
The login through double authentication is increasingly present in the access gateways of all types of platforms. It is also ideal for bringing this two-factor or two-step authentication to access user sessions and documents, apps, and VPNs. Authpoint or Duo Cisco are corporate firewall-agnostic solutions that allow you to secure authentication using two factors. Authpoint is free for the next two months.
Finally, it is essential to be supported in case all this is unnecessary at some point. Check your Backup system and make sure you are not balancing without a network. Remote user access increases the likelihood of data encryption attacks. We recommend extreme Data Protection measures following the Best practices 3+1+1+1:
Backup isolation in a dedicated network and Snaps protections in files, backup repositories and virtual machines (SAN Storage).
Also Read: Protect the Information on your Device
302 redirect play a very important role when managing websites, they allow you to redirect…
With the release of iOS 18, Apple has taken a further step in its commitment…
Guerrilla marketing is an advertising strategy characterized by its unconventional approach and low cost. Unlike…
A CRO strategy in marketing consists of implementing different marketing techniques to improve a business's…
Designing your social media posts with Canva is crucial to attract your audience's attention and…
Unlocking an Android phone without a password may seem impossible, but several methods exist to…