You Made it Through the Remote Work Scramble: Now What?

Typically, when a company moves to a remote work model, they have the luxury of time. Time to plan. Time to implement. Time to assess. The rapid workplace changes due to COVID-19 changed all that. Businesses of all sizes found themselves accelerating their mobile plans in a hurry.

 

Now that the initial scramble is over, it’s important to assess potential security gaps to stop cybercriminals eager to take advantage. Here are five steps you can take to ensure your business can continue to operate remotely while safeguarding business-critical information.

 

  1. Communicate Security Policies

Which mobile devices does the IT department support? Can employee-owned devices be used for work? If a mobile device is lost, stolen or broken, what is the process to ensure that the data on the device is/was secure? These are all questions employees are bound to ask if they haven’t already. Make sure you have the answers to address these and other concerns that may arise.

 

  1. Provide Ongoing Training

For many, working remotely has been a new concept. Make sure to train your staff on topics such as the dangers of using public Wi-Fi, the use of removable media, and how to recognize and avoid phishing scams to name a few. Hackers are constantly evolving with increasingly complex methods, so your training will need to be ongoing to stay ahead of the game.

 

  1. Utilize Multi-factor Authentication (MFA)

When properly designed and implemented, MFA methods are much more reliable and a stronger deterrent for cybercriminals. MFA not only provides increased network security, but also can help make sure the right people are accessing the right information within your organization. Take the time to evaluate your authentication process and update if needed.

 

  1. Know What’s on Your Wireless Network

You most likely have many Internet of Things (IoT) devices connecting and disconnecting from your network all day long. With the COVID-19 rush, many businesses were busy just trying to keep up with the need to assign computers and other devices. Take some time now to make sure you have clear visibility into what the devices are, who is operating them, and what they are doing.

 

  1. Monitor. Monitor. Monitor.

Deploying anti-virus software and calling it a day simply won’t work. Continuous network monitoring is one of the most proactive ways to deal with security threats and make sure your network is operating the way it should be.

 

Sound overwhelming? It doesn’t have to be. We’re experts in mobility, so wherever you are at in the process, we can help. Let’s talk!