How to Prepare Your Systems for Continued Remote Work
| August 25, 2020The work-world is going hybrid. When self-distancing, many employees moved to working from home with the intent of returning. However, recent surveys by Global Workplace Analytics indicate that a fourth to a third of remote employees will choose to remain working from home after the pandemic. Meanwhile, many businesses are reporting significant savings from not housing employees.
This means that IT needs to remain focused on both in-house and remote-access systems and security measures. The following list can help make sure your systems and processes are ready:
Update Enforceable Company Security Policies
Employees need to follow your company’s security policies. These policies need to be updated for the home and be enforced. Some policies include:
- Password Management – These should state the frequency passwords are required to be changed. How to create strong passwords. Where and how to change passwords. Not use the same passwords for personal versus office use. Which password management apps and systems to encrypt and safely track passwords are approved. EVERY device needs to be password-protected
- Home WiFi security – Every home network router needs to be secured with a passcode or security key and the firewall enabled. Employees must also install another firewall for additional security. Ideally, the WiFi connection should be split between work and home.
- GPS Tracking Software – This can locate smartphones or other devices. In particular, devices should contain the ability to be wiped should it become lost or stolen. The use of third-party GPS tracking software for tracking employees’ locations via their devices can help management and HR stay on top of performance levels and expectations.
- Maintaining Updates – While expert IT professionals are responsible for keeping the cloud updated, employees must keep their devices and security software updated, as well.
- Extended BYOD Rules – Whether your company allowed BYOD rules before, they definitely need these policies now and they need to be adapted for current usage and expectations since the pandemic began.
Extend your Cloud-Based Systems – Although you have a virtual private network, and probably have moved most of your applications, and storage to the cloud, continue the process. Particularly, moving to hosted data centers whose structure supports and provides perpetual monitoring of the systems.
Implement and Adapt Multi-Factor Authentication – It provides an extra layer of security to control access. Specifically, this type of login controls those areas that you grant employees to access. Employees should access only to the information or system that they need and nothing else, with no special exceptions due to level or position. This policing will protect your systems from external as well as internal threats.
Implement 24/7/365 Monitoring
Contract with a managed IT services provider to continuously monitor your servers and systems for cybersecurity measures and malicious cyberattacks of every type. Monitoring services should also include advanced detection, support, and published backup and recovery plans. Services should also include warnings and notifications of scams, phishing attacks, and other email-related threats.
At Concensus, we are here to help you stay safe and maintain business continuity.