Cyber Security guidelines for organizations after the lockdown

Cyber Security guidelines for organizations after the lockdown

1)    Physical Sanitize laptop

2)    Employee Communication & Awareness Campaigns

3)    Network Access Control (NAC): NAC solution to prevent unpatched machines from being connected to the network. Access to business applications is allowed once devices are compliant, fully patched and updated.

4)    Rental laptops to be handed over IT team and should not be connected to the corporate network

5)    Review of WFH access ( VDI, VPN, Webmail, etc..)

6)    Making devices contactless (Printer & scanners)

7)    Review DLP Exceptions: IT Security team must review all the risk exceptions for employees and revoke them once employees start reporting to office.

8)    Verify DNS changes

9)    Logs and Events are to be monitored closely.

10) VA/PT to be performed.

11) Desktops/Laptop: Before users go back to the office, the IT Security Team needs to ensure the systems are kept up to date with antivirus signatures, patches, and software versions. They should also ensure full AV scan and make sure that health checks of Data Leakage Prevention tools and other technologies have been performed.

12) Patch Deployments status to be verified

13) Password Change: As password is the first line of security, users must reset/change the password before they login into their system. As many organizations would have relaxed the password policy, this needs to be reset to the previous level.

14) Backup for endpoints and critical infrastructure to be verified.

15) Review all the locked accounts.

16) Cloud Infra assessment to be done.

17) Data Hygiene: For users using their personal devices while working from home, it would be good to have them clean their organization data from personal machines.

18) Password Refresh - Firewall, Routers, Switches, Database, etc.,

19) Licenses & Compliance check

20) Plan Refresh: Incident Response & DR

Gaargi Chakraborty

Content I write on Startup stories, Interviews, website content, articles and blogs on tech & cybersecurity

4 年

good gong

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了