Remote Working Data Vigilance

Remote Working Data Vigilance

Exploits and attack vectors have increased for data and voice.

Based on your technology platform, sweeping changes made to data and voice environments require testing and monitoring to ensure we are doing a good job to keep our resources safe. It is especially important when IT teams are rushed to make changes and decisions on how they going to manage work at home environment.

Some concessions need to me made, whether that includes pin holes through firewalls, VPN’s, remote desktop capabilities, or access through mobile devices that will allow employees to look like they are working from the office. All these changes to network infrastructure can create vulnerabilities for outside influence.

What can a business do?

  • Enforce Security Policy: With convenience comes risk, although some of your employees may want everything available to them that they would normally have when sitting behind your firewall, WFH is a game changer. Insist upon strong passwords and encryption when accessing data or voip resources.
  • Increase Monitoring: With your workforce dispersed and accessing company data/network, each home network becomes a vulnerable path to your network. Turn up the monitoring tools that help you notice anomalies. Finding out that you have been exploited is even harder to mitigate remotely.
  • Know When You Need Help: There are resources available, whether you need a Microsoft expert to help you configure your environment safely, a network expert to lock down the infrastructure from outside influences, or structure voice service so that you have a smart work from home communications policy. Your essential resources are local and available.

Please let us know how we can help you with any advice or direction. Sometimes an outside set of eyes on a project can help you avoid an pitfalls or hidden vulnerabilities.

The professionals at Ohio.net have see a lot and know enough to offer solid advice. Reach out to us with those “what if” or “how to” questions.

Please reach out to Alex Desberg by calling directly or setting a time to talk on my schedule here. https://calendly.com/adesberg/15min

You may also like our companion article...

4-ways to protect your phone system


要查看或添加评论,请登录

Alex Desberg的更多文章

社区洞察

其他会员也浏览了