*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
*Secure all remote devices by using anti-malware software and implementing strong firewall rules.
*Secure all remote devices by using anti-malware software and implementing strong firewall rules.
−
*Use validated encryption to protect data.
+
*Use validated encryption to protect data at rest and in transmission.
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc...
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc...
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.