Changes

Jump to navigation Jump to search
Line 21: Line 21:     
==Mitigation and Prevention Measures==
 
==Mitigation and Prevention Measures==
It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, there are a number of measures to help prevent security breaches when teleworking through all mediums.
+
It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, some helpful measures that employees can take to keep information secure are:
   −
*Mandate the use of multi-factor authentication. Some of these techniques include using an authenticator app, phone verification, etc...
+
*When the option for multi-factor authentication is available, use it!
*Develop and deploy a tiered access control system that ensures permissions are segregated.
+
*Avoid open networks located in coffee shops, public facilities, and hotels.
*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
+
*Apply operating system updates when available.
*Secure all remote devices by using anti-malware software and implementing strong firewall rules.
+
*Use your departments VPN for secured connection.
*Use validated encryption to protect data.
+
*Password Protect any USB, SD Cards and hard drives.  
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc...
+
*Lock devices when not in use.
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.
  −
*Disable or limit the ability to install applications on devices such as laptops and smartphones.
      
==Privacy==
 
==Privacy==

Navigation menu

GCwiki