Cybersecurity Essentials for Your Remote Workers: Keeping Your Business Safe
|OnDemand Webinar||$199||Add to Cart|
Understand what you should consider to strengthen cybersecurity policies and practices in the age of COVID-19.The pandemic has changed working remotely from a forward-thinking perk to a business necessity. This change has dramatically broadened the attack surface upon which businesses must protect against attacks upon their business by hackers. The situation is complicated by both the rushed way this change occurred, denying businesses the opportunity to methodically examine the people, processes, and technology which can safeguard business data. This topic is designed to address the question of what topics a business should consider to sure up cybersecurity policies and practices in the age of COVID-19?
AuthorsPatrick T. Cronin, Esq., Accenture
- Situation, Complications, Question
- People, Process, Technology
• Speaker Background
Situation, Complications, Question
• Situation - Rise of Remote Workers
• Complications - Increase in Hacking Activity
• Question - How Can We Better Secure Remote Workers?
• Deciding Who Should Be Remote
• Training Remote Workers
- Security Policies
- Compromise Risk, e.g. Malware, Phishing, etc.
• Monitoring Remote Workers
• Avoiding the 24/7/365 Issues
• IT Support
Process and Policies
• Personal Use of Provisioned Device/VM
• Bring Your Own Device (BYOD) Policies
• Identification and Authorization (IAM) Policies and Procedures
• Access to External Storage
- USB, NAS
- Use of Cloud Storage, e.g. OneDrive®, Google Drive™, iCloud®, etc.
• Data Loss Prevention (DLP) Solutions
• Collaborative Platforms, e.g. Teams, Zoom®, etc.
• Encryption of Data in Transit and at Rest
• Multi-Form Authentication
• Provisioned Equipment, i.e. a Company Laptop
• Hardened Virtual Machines (VM)
• Virtual Private Networks (VPN)
• Automated (Forced) Security Updates
• Malware Protections, e.g. Norton™, Kaspersky Anti-Virus, etc.
• ML Employee Monitoring