Changes

Line 20: Line 20:     
==Mitigation and Prevention Measures==
 
==Mitigation and Prevention Measures==
 +
It is important to realize that because Teleworking uses the internet for connectivity, it may be a target for compromise. That being said, there are a number of measures to help prevent security breaches when teleworking through all mediums.
 +
 +
*Mandate the use of multi-factor authentication. Some of these techniques include using an authenticator app, phone verification, etc...
 +
*Develop and deploy a tiered access control system that ensures permissions are segregated.
 +
*Ensure remote servers, user endpoints such as smartphones, tablets, laptops and desktops are regularly patched.
 +
*Secure all remote devices by using anti-malware software and implementing strong firewall rules.
 +
*Use validated encryption to protect data in transit and at rest.
 +
*Encrypt device storage such as hard drives, SD Cards, USB Keys, etc...
 +
*Devise policies that detail how a teleworker will access applications remotely as well as what applications and parts of the network they have access to.
 +
*Disable or limit the ability to install applications on devices such as laptops and smartphones.
    
== References ==
 
== References ==