Skip to navigation Skip to content

Secure Remote Work Summit: Private Sector and COVID-19 Remote Work Security

Minute Read

This presentation was originally delivered during the Secure Remote Work Virtual Summit, which took place on March 31, 2020.

You can view the full event summary and as well as access additional sessions from the Secure Remote Work Summit in our Secure Remote Work Resource Center.

Following is the recording and a session summary of a talk by Lauren Schwartz, CEO, Tech+Wise(Group).

Watch the session recording to learn how your business can quickly mobilize its workforce to work remotely without sacrificing security.

Watch the video or peruse the notes from the session below.

-- Article continues below --the complete secure remote work resource center

Visit the Secure Remote Work Resource Center.

Session notes

Remote Work Security

This session addresses the needs of enterprise organizations.

Lauren Schwartz fromTech+Wise(Group) joins Joe Gatto from Attila Security to talk through the key challenges and strategic solutions available to businesses looking to enable their employees to work remotely in a way that does not compromise cybersecurity.

BecauseTech+Wise(Group) is a Microsoft partner, that company’s products will be central to this treatment of remote work security.

Tech+Wise(Group) provides cloud services and comprehensive tech support in the mid-market space (50-25K users or employees). 100% ofTech+Wise(Group) customers are in Microsoft Cloud. They’re intimately aware of industry challenges in numerous fields.

Tech+Wise(Group) is helps customers with security strategies and has multiple recommendations for improving safety-conscious remote work processes.

Recommendations for secure remote work

Tech+Wise(Group) recommends a range of solutions that include things such as advanced threat protection, anti-phishing solutions and securing VPNs. In this environment, the latter has been a high priority, giving remote workers the ability to access the network when off-site.

There are multiple batch solutions for securing endpoints, including any device that accesses corporate data (think on-premise servers, desktops, mobile devices, laptops, tablets, etc.).

Customers should, first and foremost, have modern hardware and keep software up-to-date.

Secure identities

Then, Tech+Wise coaches clients on how to secure identities:

  • Who is connecting to your environment?
  • Are they supposed to be connecting to your environment?
  • Do you have a good password policy in place?
  • Do you have multi-factor authentication?

 

Secure data

The next priority is the security of data relating to things like customers, chemical recipes, proposal processes, proprietary documents and more.

These assets belong to a company and should be protected through:

  1. Encryption
  2. Access control
  3. Safe storage

 

Systems should be in place to organize and collaborate. Many companies allow numerous applications (Dropbox, Sharepoint, Google Drive, etc.) which makes it hard to track where data is stored and how it is secured.

Educate employees

Employees should know how to use the security tools that have been made available to them, and a company’s processes for security should be clear so that employees know how to align with those standards.


Read the Guide: The Secure Remote Work Guide

How to Work from Home Securely During the Coronavirus Outbreak & Beyond.

Read Now


High priority remote work security standards

The two most critical areas when it comes to remote work security are:

  • Protecting your data
  • Educate your employees

 

While these were mentioned above, they deserve to be further highlighted because they are the most vital for remote work security.

Suggested solution: Microsoft Teams

This solution provides a comprehensive solution for:

  • Collaboration
  • Meetings and calling with video
  • Document collaboration, management and protection
  • Chat and sharing
  • Published application space
  • Foundation of security and compliance are built in

 

Microsoft Teams is a role-based system so it’s easy to control access.

Suggested solution: eLearning

With the COVID-19 pandemic, a lot of people suddenly became remote workers. This meant that businesses were scrambling to get everyone up to speed on best practices and remote work safety measures.

eLearning is a great tool to address this for a number of reasons:

  • Efficient and affordable training
  • Fast return to productivity
  • Awareness of safety threats

 

This solution addresses all of the major needs for security training.

For more info on these solutions or for specific guidance, you can email Gettechwise@techwise.com.

Tech+Wise is also providing 30 days of free remote work productivity learning. Use the email above or go here to contact them through their site.


Read the Case Study: Transitioning to Secure Remote Work

How ASSETT Seamlessly Transitioned Its Team To Securely Working From Home During the COVID-19 Pandemic With GoSilent.

Read Now


Q & A from listeners

The hosts offer questions from the listeners.

Q: How do these principles work with GSuite projects?

A: Many teams migrate from GSuite to Microsoft. There are a few different ways to do it. You can migrate over time or all at once. Some clients start with migrating just as a communication tool and then slowly shift data and information over.

Q: How hard is it to set up VPNs and other security for people who already work from home?

A: Remote support should be available for any workers who are accessing content from home. This is possible for most kinds of teams, whether they already work from home or are transitioning over.

Q: What are the biggest mistakes companies are making?

A: If they weren’t using collaboration software before, it can be a huge challenge. There is also a challenge for hardware availability. If there was no mobility strategy, that can be a little painful.

There is currently a laptop shortage so we are facing realities of supply and available hardware. Anti-phishing training is also very important. Regular, employee training has to occur for people to recognize phishing.

Government guide to secure remote work