Consumers are doing most of their shopping online this year AND everyone is working remotely. Keeping those devices patched is even more challenging, but it’s more important than ever. The following best practices can help you create a secure remote environment for you and your business.
Enable (Virtual Private Network) VPN for remote endpoints
With more companies, and consumers, shifting to the remote environment due to the COVID-19 crisis, vulnerable endpoint devices can become easy points of entry for cybercriminals. Setup VPN on your remote endpoints to allow a secure link back to your secure office environment. You can use your endpoint management solution to deploy the VPN client, configure it, and once it’s all set up, you can monitor it and ensure that it is up and running.
Patch your off-network devices
Automate patching of your off-network devices, monitor the patch status on all machines and track the vulnerabilities that can impact your environment. Vulnerable endpoint devices can become easy points of entry for cybercriminals. Endpoints become vulnerable if the software running on them isn’t patched in a timely manner.
Implement two-factor authentication (2FA)
2FA provides a second layer of authentication to access your applications by requiring users to provide a password (something they know) and a mobile app or token (something they have). 2FA is one of the easiest methods you can use to prevent cybercriminals from taking advantage of weak or stolen credentials (passwords) and hacking into your systems. Many people don’t realize how dangerous it is to reuse the same username and/or password for everything – or to never update their passwords. It’s very likely that at least one of your active passwords has fallen into the hands of hackers.
Your credentials can be out there on the Dark Web just waiting for cybercriminals to take advantage of them. Don’t let them! Review your current passwords and check to see if you are on the is list of password fails and wins.
Get involved in cybersecurity training
The weakness of any door is that legitimate people need to be able to get in and out. It’s almost certain that you’ve seen a phishing attack in action in your own daily life. Cybersecurity training can help us all from falling victim to these kinds of attacks.
A common tactic is to put a link in the email that takes you to a fake version of the real website. You try to log in to that fake site with your real credentials, which the attackers then grab and use on the real site. We talked about spear phishing, smishing and whale phishing previously.
With more employees now working from home than ever before, cybersecurity training is absolutely essential. Knowledge is power and a critical component of cyber readiness is having on-demand insight of anomalous activities, suspicious changes, potentially harmful misconfigurations or any other malicious activities occurring internally on your network.
Use cloud backup for your remote workforce
Your workforce may be scattered at the moment, but your equipment doesn’t have to be. Protect your data without the hassle of setting up an appliance or local storage in multiple locations. Cloud backup is the simplest way to back up from anywhere with internet connectivity—including WiFi, so the data on remote endpoints is covered as well.
Now is the time to implement preventative solutions for endpoint security and backups, identity and access management, automated phishing defense, Dark Web monitoring and security awareness training. While a 100 percent fail-safe approach to cybersecurity isn’t a reality just yet, we can certainly walk you through a list of best practices that will hold you in good stead for the future.
Want more tips? Follow us to learn more about IT security solutions and monitoring. We can help you design a solution to meet your need. Here at ManagedTEK we strive to provide top security solutions. If you have an immediate IT need, you can always reach us at 707.205.3727. ManagedTEK’s goal is to create a plan specifically focused on each business that we serve. Technology made simple.