There is a consensus that the transition to a more working from home model is going to stay after COVID-19. 🛋
The cybersecurity community has made a lot of work to provide a secure framework for remote working, as is illustrated by Peter Wayner in CSO where he highlights 6 top technologies 🤓
🛡 TLS certificates will encrypt remote connections to sites. Make sure you use TLS 1.3
🛡 Zero Trust solutions will grant remote users access only to those resources and services they are authorized to inside the network.
🛡 SASE or Secure Service Edge, a security cloud based service that acts as the gatekeeper of all the user accesses.
🛡 Cloud Storage and Data Loss Prevention, Keeping all sensitive data in a secure cloud, and controlling no sensible data is not extracted out of it.
🛡 MFA multifactor authentication, or 2FA. Adding additional authentication factors to the vulnerable user + password credentials.
🛡 Identity and Access Management, providing robust mechanisms to verify every user.
Most cybersecurity vendors offer these solutions.
You can start with a security audit, to understand which ones you need. 🔍
When did you perform your last security audit? 🤔
Links:
CSO article: https://www.csoonline.com/article/3603474/6-top-security-technologies-to-protect-remote-workers.html
LinkedIn post and comments: https://www.linkedin.com/posts/juanjomartinezpagan_securityaudits-workingfromhome-cybersecurity-activity-6765161475469271040-DhQ-
Comments