Changes

Jump to navigation Jump to search
Line 40: Line 40:  
*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
 
*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
 
*Secure all remote devices by using anti-malware software and implementing strong firewall rules.
 
*Secure all remote devices by using anti-malware software and implementing strong firewall rules.
*Use validated encryption to protect data.
+
*Use validated encryption to protect data at rest and in transmission.
 
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc...
 
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc...
 
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.
 
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.

Navigation menu

GCwiki