Don’t have people just unplugging their workstations and if it is going to work. Make sure everyone is connecting securely.
There are security risks and things to consider when going to an all remote workforce
Make sure that you have the right licensing and that you are connecting securely to the network
Make sure you have the right set up
Use your protection and still have that human firewall set up so you “yourself” can keep your companies information protected.
Must have #2 – “Backward Cloud Resiliency”
When we think about the cloud, we think about infrastructure that someone else owns that sits out in the data center, that we pay a monthly fee for.
This cloud strategy is a way to not pay for the expensive hardware or maintenance that goes into it.
When we mobilize our workforce, we back into a cloud situation.
The risk is single points of failure. (a failing piece of equipment)
Must have #3 – A Cloud Strategy
Its important to have a strategy how to move things to the cloud and how important and critical they are to help your company operate.
A hybrid cloud is referring to where only a portion of your business is operating from the cloud.
At Entech, our business is almost a 100% cloud based, everything that we need to do from an operational standpoint is accessible to the cloud.
This is something that is available to every business, if you have a strategy on how to get there.
The cloud is up and coming, its only going to be a matter of time before business move directly to the cloud. First there is great financial incentive for them from a recurring revenue perspective rather than making a lump some purchase. Most importantly the reason why people move to cloud is to be secure.
Must have #4 – Managing Mobility
There is a technological and a policy side to managing mobility, what risk are you willing to take as a business owner?
As our workforce becomes more mobile, there is going to be risk of data leaking to mobile devices and other technologies.
Make sure the devices that are connecting into your network are secure and don’t infect your data.
As users are working, make sure employees are not keeping data on machines that are not being managed.
This is another challenge, access to information is important. 2 factor authentication helps keep your network and business secure.
Must have #5 – Data Leakage Blockades
Most people focus on someone getting into your network or the leakage happening from outside of your network.
Data leakage is where data is leaking on unsecured devices.
Being able to detect it is something that can be fixed and detected easily if using the right tools.