| Line 21: | Line 21: | 
|  |  |  |  | 
|  | ==Mitigation and Prevention Measures== |  | ==Mitigation and Prevention Measures== | 
| − | It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, there are a number of measures tohelp prevent security breaches when teleworking through all mediums.  | + | It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, some helpful measures that employees can take to keep information secure are:  | 
|  |  |  |  | 
| − | *Mandate theuse of multi-factor authentication. Some of these techniques include using an authenticator app,phone verification, etc... | + | *When the option for multi-factor authentication is available, use it! | 
| − | *Develop and deploy a tiered access control system that ensures permissions are segregated. | + | *Avoid open networks located in coffee shops, public facilities, and hotels. | 
| − | *Ensure remote servers, user endpoints such as smartphones,tablets,laptops anddesktops are regularly patched.
 | + | *Apply operating system updates when available. | 
| − | *Secure all remote devices by using anti-malware software and implementing strong firewall rules. | + | *Use your departments VPN for secured connection. | 
| − | *Use validated encryption to protect data. | + | *Password Protect any USB, SD Cards and hard drives.   | 
| − | *Encrypt device storage such as hard drives, SD Cards, USB Keys, etc... | + | *Lock devices when not in use. | 
| − | *Devise policies that detail how a teleworker will access applications remotely as well as what applications andparts of the network they have access to.
 |  | 
| − | *Disable or limit the ability to install applications on devicessuch as laptops and smartphones. |  | 
|  |  |  |  | 
|  | ==Privacy== |  | ==Privacy== |