Some companies have decided to follow the BYOD strategy, when employees use personal devices: a personal PC or laptop, which the company cannot always control. However, the BYOD concept requires ensuring a separate area of information security - the security of mobile users. In the best case, companies have managed to provide users with secure remote access, but they have hardly controlled at least the availability of antivirus software and the relevance of its databases, not to mention data isolation and software control.
from corporate devices, the likelihood of family members using a company laptop has increased significantly: the amount of time spent outside the office multiplied by the number of employees.
Previously, an employee, coming to the office, felt more belarus mobile database for compliance with the rules of information security. Human psychology is such that at a distance, fear, responsibility and attentiveness decrease - in the office, everyone assumes that the watchful "eye" of information security is directed in his direction, among other things.
Returning to the office: what to check?
Now that we are coming out of the extended work-from-home regime, it is important to understand what, from an information security point of view, we should pay attention to first, what to check and update:
It is imperative to check devices that will return to the office for potentially dangerous programs and files. A study by DeviceLock found that the number of vulnerable Windows computers in Russia has increased by 230%;
it is necessary to audit the architecture of technical solutions brought to the perimeter: how securely they are configured and published. Decide which services are needed on the perimeter and which ones need to be returned back to the perimeter. Using DMZ, reverse proxies and other technologies significantly complicates penetration into the company's network when successfully hacking services accessible from the outside. Yes, let the company have RDP, which is published, but perhaps it is worth introducing two-factor authentication, this will significantly protect the company from attacks at the authentication level. At the same time, it will be necessary to ensure close control over all services accessible from the outside (set up a high level of logging and response to suspicious events);
Even if employees work remotely
-
- Posts: 537
- Joined: Mon Dec 23, 2024 3:13 am