Cyber security

5 Cybersecurity Tips to Keep Your Remote Workforce/Business Safe

  1. Although it’s tempting, avoid “Shadow IT”

    Shadow IT is defined as “devices, software, and services outside the ownership or control of IT organizations.” Employees often utilize apps and devices (ie., cloud storage, personal PCs, mobile devices, etc.), with good intentions (e.g., to be productive). However, they may not be safe to use for guarding intellectual property or internal assets. Shadow IT is especially harmful for regulated industries like healthcare or banking. The good news is that we can create policies and educate employees about Shadow IT, adopt or prohibit services from use, discover existing Shadow IT, deal with it accordingly, and/or create information classifications (e.g., public, private, or confidential), so employees know what is appropriate to share.
  2. Deploy Multi-Factor Authentication

    With a remote workforce, knowing who is accessing your network and files and why is extremely important. So why not put a solution in place to make that a necessity and ensure who is asking for access is who they say they are? Multi-factor authentication (MFA) supplements your password requirements by requiring a second layer of identity verification before granting someone access to your apps and files. MFA uses  a combination of the following elements to prove a user’s identity: 1) Something you KNOW (username and password), 2) Something you HAVE (token or smartphone to generate pins or authentication prompts), and 3) Something you ARE (thumbprint, voice, or face ID). If you’re not familiar with how to set this up, work with a seasoned IT professional or Managed Service Provider, like Systems Engineering, to put MFA in place. 
  3. Secure Collaboration Platform

    One element of WFH or remote work that will become more important than ever is team collaboration and camaraderie. If critical documents and files are being shared freely through these apps, it is important to know that the built-in cybersecurity of many collaboration apps is basic. Just like with email, proper cybersecurity measures can be implemented to protect business data on the collaboration platform. Check with your IT professional to see what collaboration tools you have in place that can be trusted. 
  4. Appoint someone internally to deal with all cybersecurity policies

    Knowing who employees can turn to in a crisis is an important step in managing a healthy cybersecurity plan for your organization. Having written policies and someone who understands them inside and out will help mitigate any issues that arise. 
  5. Get a professional Cybersecurity risk assessment done

    Recently, productivity took priority over cybersecurity.   If you’re not sure where you stand on cybersecurity for your remote workforce, work with a cybersecurity professional will help you uncover the gaps in your defense and prioritize what protocols, processes, and/or secure platforms you need to put in place to maintain the safety of your business and assets.  The last thing any business wants is to learn about their cyber weaknesses from a hacker.  

Content provided by Systems Engineering, an IT strategy and managed services provider delivering technical and business solutions to clients across New England.

Leave a Reply

Your email address will not be published. Required fields are marked *