When employees transition from working in the closely-guarded walls of an office to the wild unknown of remote locations, companies have to come up with an entirely new security game plan to ensure they mitigate any and all risks and attacks. To make this process less stressful, the following checklist is a great starting point to help safeguard your company’s assets and confidential information.
1) Determine which endpoint protection you will require for WFH employees.
When employees work remotely, the level of control you had over their computers while in the office is no longer possible. This is when endpoint protection, like Windows Defender, becomes a necessary antivirus tool in order to protect them. Requiring all home employees to use an antivirus tool on any machine that access company resources is also highly recommended. In addition, consider if you need to use alternative cloud-based means to monitor workstations and review what support console tools you currently use as well as the necessary licenses needed to access computers that aren’t part of your domain.
2) Implement two-factor authentication (2FA).
When adding more remote access solutions, consider adding two-factor authentication. While your company may need to move quickly to allow employees to work remotely, you can still ensure that only those admins and users are allowed in and not any attackers as well.
3) Use a virtual private network (VPN).
VPNs have been a mainstay in remote work for years, but recently several high-profile vulnerabilities have been exposed. Often, VPN software with long-term employees hasn’t been updated in years, so ensure your VPN solutions are up to date both on the server or firewall, or on the employees’ computers.
4) Educate employees on COVID-19 scams and update acceptable use policies.
The National Cyber Awareness system recently sent out an announcement of current COVID-19 scams making the rounds, so remind your team not to click on unsolicited emails and to only use trusted, official websites. In addition, a central online bulletin board is a good idea for updates and notifications in case anyone in your company is infected. Finally, verify that your acceptable computer use policies are updated to reflect best practices for remote usage.
5) Take a proactive security approach to security and schedule a threat assessment, as well as a review of the impact to firewalls, conditional access policies, and other logging.
Stay ahead of potential security risks and attacks with a proactive security approach— going beyond the standard vulnerability snapshot from a set of external-facing IPs or a wireless internal segmentation assessment. Consider taking a more comprehensive snapshot of everything that’s happening, including all remote connections, all critical assets, and users that are connecting to remote systems from various locations. Threat-hunting workshops are also a good idea to help determine how a malicious actor might break into a system.
For those who use geoblocking in their firewall to restrict access from different locations, policies will need to be reviewed and revised too now that employees will be logging in from various locations.
You may also need to increase bandwidth for inbound traffic to your organization and potentially diagnose and determine if remote employees have appropriate bandwidth to support Office work and video conferencing, if your company relies on cloud services. Lastly, find out if the security settings of home firewalls and internet providers will block some of your intended remote access.