Cyber Security guidelines for organizations after the lockdown
Nantha Ram R
Cybersecurity Leader at Dyson | Ex-3M | Ex-TVS Group | Strategic Leader in IT & OT Security | Risk Management | Cyber Security Leader | Mentor | All Comments are Personal Opinions
1) Physical Sanitize laptop
2) Employee Communication & Awareness Campaigns
3) Network Access Control (NAC): NAC solution to prevent unpatched machines from being connected to the network. Access to business applications is allowed once devices are compliant, fully patched and updated.
4) Rental laptops to be handed over IT team and should not be connected to the corporate network
5) Review of WFH access ( VDI, VPN, Webmail, etc..)
6) Making devices contactless (Printer & scanners)
7) Review DLP Exceptions: IT Security team must review all the risk exceptions for employees and revoke them once employees start reporting to office.
8) Verify DNS changes
9) Logs and Events are to be monitored closely.
10) VA/PT to be performed.
11) Desktops/Laptop: Before users go back to the office, the IT Security Team needs to ensure the systems are kept up to date with antivirus signatures, patches, and software versions. They should also ensure full AV scan and make sure that health checks of Data Leakage Prevention tools and other technologies have been performed.
12) Patch Deployments status to be verified
13) Password Change: As password is the first line of security, users must reset/change the password before they login into their system. As many organizations would have relaxed the password policy, this needs to be reset to the previous level.
14) Backup for endpoints and critical infrastructure to be verified.
15) Review all the locked accounts.
16) Cloud Infra assessment to be done.
17) Data Hygiene: For users using their personal devices while working from home, it would be good to have them clean their organization data from personal machines.
18) Password Refresh - Firewall, Routers, Switches, Database, etc.,
19) Licenses & Compliance check
20) Plan Refresh: Incident Response & DR
Content I write on Startup stories, Interviews, website content, articles and blogs on tech & cybersecurity
4 年good gong