It will come as no surprise that, despite a constant pendulum swing in workplace trends, remote work is still booming. With climbing real estate prices in high-opportunity cities and clogged freeways from workers taking on long commutes, remote work is a trend that will only continue. Yet with that workplace flexibility comes security challenges.

Even without remote work, cybersecurity is a growing problem for organisations. According to the Ponemon Institute, since 2016, the average number of cybersecurity incidents involving employee or contractor negligence has increased by 26 percent and by 53 percent for criminal and malicious insider incidents. Remote work has had a major impact. As a Secure Computing comment suggests, Wi-Fi is a big culprit of security breaches. Worryingly, further research reveals 77 percent of businesses do not have a cybersecurity incident response plan applied consistently across the organisation to cope with breaches.

Cloud managed AV solution with Syslog/SIEM integration: This will enable us to merge threatdetection data with other security-related events in our organisation. Gives us a single pane of glass to see what is happening globally across our environment.
Single Sign-On (SSO): full adoption of SSO to provide greater security for IT personnel who access the management console, as fewer credentials are at risk of being compromised.
Role-based access control (RBAC): The AV solution we choose should also support RBAC, enabling our team to define roles and permissions based on groups.

82 percent of cloud users have experienced security events due to confusion over Shared Responsibility Security Models, according to the Oracle and KPMG report.

Security awareness training

Confidentiality: What would be bad if made publicly available? PII, proprietary data (competitors could profit from this)
Integrity: What would be bad if it were changed or deleted?
Availability: What would be bad if you couldn’t get to it?

According to Real Business, 86-year-old Alec Daniels had very little knowledge of computers prior to hacking a public Wi-Fi hotspot in 16 minutes.

The Rules

All machines should be encrypted: Create a barrier to entry for anyone who gets unauthorised access to a corporate machine. This includes BYOD.

MDM: Mobile device management, or AV on a phone; cost can be a factor. Standardise antivirus/ anti-malware for corporate machines and BYOD.

Basic phishing protection: Mobile AV should have this capability on the web and warn/ notify the customer if they are on a malicious site.

Mobile devices need an AV: AV needs to scan apps on devices and memory cards if in place. It should have the functionality to delete any apps that are known as malicious, as well as Potentially Unwanted Programs (PUPs) and Potentially Unwanted Modifications (PUMs).

Anti-ransomware protection: Necessary to stop screen lock or file encryption, with the ability to remediate.

More than 200 apps were found tobe exposing sensitive consumer information, with close to 60 percent of the leaks coming from news, sports, and shopping apps, according to the 2017 Mobile Leak Report.

BYOD policy

• Encryption
• Passcode
• Find my phone
• No jailbreaking
• Approved device list

A BYOD infographic shows 36 percent of firms have at least half of employees on BYOD.

What do we need in our AV?

Anti-ransomware technologies: One of our team member’s computers was encrypted. That data is lost. Proactive anti-ransomware protection could have stopped this.

To read full download the whitepaper:
Lattes, lunch, and VPNs: securing remote workers the right way

SEND ME WHITEPAPER