Line 21: |
Line 21: |
| | | |
| ==Mitigation and Prevention Measures== | | ==Mitigation and Prevention Measures== |
− | It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, there are a number of measures to help prevent security breaches when teleworking through all mediums. | + | It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, some helpful measures that employees can take to keep information secure are: |
| | | |
− | *Mandate the use of multi-factor authentication. Some of these techniques include using an authenticator app, phone verification, etc... | + | *When the option for multi-factor authentication is available, use it! |
− | *Develop and deploy a tiered access control system that ensures permissions are segregated. | + | *Avoid open networks located in coffee shops, public facilities, and hotels. |
− | *Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
| + | *Apply operating system updates when available. |
− | *Secure all remote devices by using anti-malware software and implementing strong firewall rules. | + | *Use your departments VPN for secured connection. |
− | *Use validated encryption to protect data. | + | *Password Protect any USB, SD Cards and hard drives. |
− | *Encrypt device storage such as hard drives, SD Cards, USB Keys, etc... | + | *Lock devices when not in use. |
− | *Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.
| |
− | *Disable or limit the ability to install applications on devices such as laptops and smartphones. | |
| | | |
| ==Privacy== | | ==Privacy== |