SlideShare a Scribd company logo
1 of 19
Download to read offline
Joey Howland
Chief Information Security Officer
The Changing Workplace Environment:
Cybersecurity for a Remote Workforce
Why This Matters
Financial
Impact
Customer
Confidence
Employee
Protection
$6 trillion in cyber-
crime costs by 2021
3 billion PII records
stolen last year
Payroll cyber attacks
hit employee wallets
Herjavec Group
• Outside organization’s security boundary
• Often working on shared computers
• Increase in attempts by malicious actors during crisis
Why Home is Different
• National Institute of Standards and Technology
https://www.nist.gov/cyberframework
The NIST Cybersecurity Framework
What you should consider as an organization?
How are your employees working? Where are they
accessing organizational data or applications?
• Organization's network (file servers, local
applications)
• Cloud solutions (Office 365 / G-Suite, CRM, Finance
apps, etc.)
Identify Areas of Access
What controls are in place to ensure only your employees
can get to your systems?
• Virtual Private Networks (VPN)
• Secure Remote Access Solutions
• Citrix
• Splashtop
MS Remote Desktop Protocol (RDP) is not secure
• Good remote access solution but be behind another
security boundary
How do employees gain access?
Watch all entry points
• Intrusion Detection Systems (IDS)
• Log File Retention – Analyze them!
• Don’t forget Cloud based systems
• Security Information and Event Management (SIEM)
• Capture and analyze all data
• 3rd party monitored
Monitor Points of Entry
Setup MFA on all access points to organizational data or
systems. Don’t rely on simple ID / password combinations.
• Security questions are not MFA
• E-mail should be the last MFA option
• SMS (Text messages) / Phone calls – Good
• Mobile Application or Key fobs – Excellent!
Enable Multifactor Authentication
Are you allowing connections from unsafe devices?
• Consider only allowing connection from organization
owned devices
• Provide protective software – Endpoint protection
• Access control systems – basic checks before allowing a
connection
Secure Remote Endpoints
Consider how data may be moved in and out of your
environment
• How can I ensure data on employee owned devices is
backed up?
• Do I need to put limits on confidential data so it cannot
be moved outside my organization?
• How can I ensure data moving into my systems is safe?
Protect Your Data
Phishing Attacks
Personal emails often don’t have the same level of protection as enterprise
email solutions.
Unfamiliar Websites
Reports show cyber attackers taking advantage of the COVID-19
situation to spread malware. You should never need to download
something in order to view an online map.
Train your employees!
What can your employees do?
Update your computer’s operating system
• Check the version of Windows you have
• Windows 7 is now end-of-life, which means no more security patches!
• Install the latest patches
Update your web browser
• Go to the vendor’s website and find out how
Install or update antivirus software
• Good options include Webroot, BitDefender, Norton, McAfee
• Make certain virus signatures are up to date!
Secure Their Computers
Secure WiFi routers or firewalls
• Update the device firmware
• Change default admin password
• Disable remote management
• Instructions on vendor's website
Update Internet-connected devices
• Google Nest, security system, toaster, etc.
Secure Their Networks
Copy local documents back into your organization’s
environment.
Common tools include (Organization controlled):
• OneDrive / SharePoint
• Google Drive
• Citrix ShareFile
• Box
• DropBox
• VPN
Backup Your Data
If you see a suspicious email, link, or website, share it
through the proper channels.
Communicate Suspicious Activity
1. Secure The Computer
2. Secure The Network
3. Provide quality remote access solutions
4. Enable Multifactor Authentication
5. Backup The Data
6. Communicate Suspicious Activity
7. Be Click Cautious
Review
Click cautious > click curious
Thank you and stay safe!
Learn more at VC3.com
joe.howland@vc3.com

More Related Content

What's hot

Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TCBill Watters
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enoughNovosco
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsJumpCloud
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...Micro Focus
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration Fidelis Cybersecurity
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Core Security
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small BusinessSYMBIONT, INC.
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsJumpCloud
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-EraJK Tech
 

What's hot (20)

Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TC
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enough
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 

Similar to Cybersecurity for Remote Workforce

Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Resolver Inc.
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 

Similar to Cybersecurity for Remote Workforce (20)

Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Cloud security
Cloud securityCloud security
Cloud security
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

More from nado-web

Federal Legislative Update
Federal Legislative UpdateFederal Legislative Update
Federal Legislative Updatenado-web
 
Plenary - Stars of the Southwest: Lifting Regional Economies
 Plenary - Stars of the Southwest: Lifting Regional Economies Plenary - Stars of the Southwest: Lifting Regional Economies
Plenary - Stars of the Southwest: Lifting Regional Economiesnado-web
 
Outdoor Rec in Southwest New Mexico
Outdoor Rec in Southwest New MexicoOutdoor Rec in Southwest New Mexico
Outdoor Rec in Southwest New Mexiconado-web
 
Affordable and Accessible Housing: Imperative for Strong Economies
Affordable and Accessible Housing: Imperative for Strong Economies      Affordable and Accessible Housing: Imperative for Strong Economies
Affordable and Accessible Housing: Imperative for Strong Economies nado-web
 
Creative Collaborations: Tribal Nations
Creative Collaborations: Tribal NationsCreative Collaborations: Tribal Nations
Creative Collaborations: Tribal Nationsnado-web
 
Regional Resilience Partnership
Regional Resilience PartnershipRegional Resilience Partnership
Regional Resilience Partnershipnado-web
 
Louisiana's Digital Equity Plan
Louisiana's Digital Equity PlanLouisiana's Digital Equity Plan
Louisiana's Digital Equity Plannado-web
 
Broadband- Ruffin
Broadband- RuffinBroadband- Ruffin
Broadband- Ruffinnado-web
 
West Texas Aerospace and Defense Manufacturing Coalition
West Texas Aerospace and Defense Manufacturing CoalitionWest Texas Aerospace and Defense Manufacturing Coalition
West Texas Aerospace and Defense Manufacturing Coalitionnado-web
 
H2theFuture
H2theFutureH2theFuture
H2theFuturenado-web
 
Tulsa Regional Advanced Mobility (TRAM) Corridor
Tulsa Regional Advanced Mobility (TRAM) CorridorTulsa Regional Advanced Mobility (TRAM) Corridor
Tulsa Regional Advanced Mobility (TRAM) Corridornado-web
 
Oklahoma Biotech Innovation Center
Oklahoma Biotech Innovation CenterOklahoma Biotech Innovation Center
Oklahoma Biotech Innovation Centernado-web
 
Northern New Mexico Workforce Integration Network (WIN)
Northern New Mexico Workforce Integration Network (WIN)Northern New Mexico Workforce Integration Network (WIN)
Northern New Mexico Workforce Integration Network (WIN)nado-web
 
Brownfields Presentation
Brownfields PresentationBrownfields Presentation
Brownfields Presentationnado-web
 
Kansas State University UC Showcase
Kansas State University UC ShowcaseKansas State University UC Showcase
Kansas State University UC Showcasenado-web
 
KCSL UMKCIC University Center
KCSL UMKCIC University CenterKCSL UMKCIC University Center
KCSL UMKCIC University Centernado-web
 
University of Montana Rural Innovation Initiative
University of Montana Rural Innovation InitiativeUniversity of Montana Rural Innovation Initiative
University of Montana Rural Innovation Initiativenado-web
 
University of Kansas University Center
University of Kansas University Center University of Kansas University Center
University of Kansas University Center nado-web
 
University of North Dakota Center for Innovation
University of North Dakota Center for InnovationUniversity of North Dakota Center for Innovation
University of North Dakota Center for Innovationnado-web
 
Iowa State University CIRAS
Iowa State University CIRASIowa State University CIRAS
Iowa State University CIRASnado-web
 

More from nado-web (20)

Federal Legislative Update
Federal Legislative UpdateFederal Legislative Update
Federal Legislative Update
 
Plenary - Stars of the Southwest: Lifting Regional Economies
 Plenary - Stars of the Southwest: Lifting Regional Economies Plenary - Stars of the Southwest: Lifting Regional Economies
Plenary - Stars of the Southwest: Lifting Regional Economies
 
Outdoor Rec in Southwest New Mexico
Outdoor Rec in Southwest New MexicoOutdoor Rec in Southwest New Mexico
Outdoor Rec in Southwest New Mexico
 
Affordable and Accessible Housing: Imperative for Strong Economies
Affordable and Accessible Housing: Imperative for Strong Economies      Affordable and Accessible Housing: Imperative for Strong Economies
Affordable and Accessible Housing: Imperative for Strong Economies
 
Creative Collaborations: Tribal Nations
Creative Collaborations: Tribal NationsCreative Collaborations: Tribal Nations
Creative Collaborations: Tribal Nations
 
Regional Resilience Partnership
Regional Resilience PartnershipRegional Resilience Partnership
Regional Resilience Partnership
 
Louisiana's Digital Equity Plan
Louisiana's Digital Equity PlanLouisiana's Digital Equity Plan
Louisiana's Digital Equity Plan
 
Broadband- Ruffin
Broadband- RuffinBroadband- Ruffin
Broadband- Ruffin
 
West Texas Aerospace and Defense Manufacturing Coalition
West Texas Aerospace and Defense Manufacturing CoalitionWest Texas Aerospace and Defense Manufacturing Coalition
West Texas Aerospace and Defense Manufacturing Coalition
 
H2theFuture
H2theFutureH2theFuture
H2theFuture
 
Tulsa Regional Advanced Mobility (TRAM) Corridor
Tulsa Regional Advanced Mobility (TRAM) CorridorTulsa Regional Advanced Mobility (TRAM) Corridor
Tulsa Regional Advanced Mobility (TRAM) Corridor
 
Oklahoma Biotech Innovation Center
Oklahoma Biotech Innovation CenterOklahoma Biotech Innovation Center
Oklahoma Biotech Innovation Center
 
Northern New Mexico Workforce Integration Network (WIN)
Northern New Mexico Workforce Integration Network (WIN)Northern New Mexico Workforce Integration Network (WIN)
Northern New Mexico Workforce Integration Network (WIN)
 
Brownfields Presentation
Brownfields PresentationBrownfields Presentation
Brownfields Presentation
 
Kansas State University UC Showcase
Kansas State University UC ShowcaseKansas State University UC Showcase
Kansas State University UC Showcase
 
KCSL UMKCIC University Center
KCSL UMKCIC University CenterKCSL UMKCIC University Center
KCSL UMKCIC University Center
 
University of Montana Rural Innovation Initiative
University of Montana Rural Innovation InitiativeUniversity of Montana Rural Innovation Initiative
University of Montana Rural Innovation Initiative
 
University of Kansas University Center
University of Kansas University Center University of Kansas University Center
University of Kansas University Center
 
University of North Dakota Center for Innovation
University of North Dakota Center for InnovationUniversity of North Dakota Center for Innovation
University of North Dakota Center for Innovation
 
Iowa State University CIRAS
Iowa State University CIRASIowa State University CIRAS
Iowa State University CIRAS
 

Recently uploaded

(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012rehmti665
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.pptsilvialandin2
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...Garima Khatri
 

Recently uploaded (20)

(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
Model Town (Delhi)  9953330565 Escorts, Call Girls ServicesModel Town (Delhi)  9953330565 Escorts, Call Girls Services
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
 

Cybersecurity for Remote Workforce

  • 1. Joey Howland Chief Information Security Officer The Changing Workplace Environment: Cybersecurity for a Remote Workforce
  • 2. Why This Matters Financial Impact Customer Confidence Employee Protection $6 trillion in cyber- crime costs by 2021 3 billion PII records stolen last year Payroll cyber attacks hit employee wallets Herjavec Group
  • 3. • Outside organization’s security boundary • Often working on shared computers • Increase in attempts by malicious actors during crisis Why Home is Different
  • 4. • National Institute of Standards and Technology https://www.nist.gov/cyberframework The NIST Cybersecurity Framework
  • 5. What you should consider as an organization?
  • 6. How are your employees working? Where are they accessing organizational data or applications? • Organization's network (file servers, local applications) • Cloud solutions (Office 365 / G-Suite, CRM, Finance apps, etc.) Identify Areas of Access
  • 7. What controls are in place to ensure only your employees can get to your systems? • Virtual Private Networks (VPN) • Secure Remote Access Solutions • Citrix • Splashtop MS Remote Desktop Protocol (RDP) is not secure • Good remote access solution but be behind another security boundary How do employees gain access?
  • 8. Watch all entry points • Intrusion Detection Systems (IDS) • Log File Retention – Analyze them! • Don’t forget Cloud based systems • Security Information and Event Management (SIEM) • Capture and analyze all data • 3rd party monitored Monitor Points of Entry
  • 9. Setup MFA on all access points to organizational data or systems. Don’t rely on simple ID / password combinations. • Security questions are not MFA • E-mail should be the last MFA option • SMS (Text messages) / Phone calls – Good • Mobile Application or Key fobs – Excellent! Enable Multifactor Authentication
  • 10. Are you allowing connections from unsafe devices? • Consider only allowing connection from organization owned devices • Provide protective software – Endpoint protection • Access control systems – basic checks before allowing a connection Secure Remote Endpoints
  • 11. Consider how data may be moved in and out of your environment • How can I ensure data on employee owned devices is backed up? • Do I need to put limits on confidential data so it cannot be moved outside my organization? • How can I ensure data moving into my systems is safe? Protect Your Data
  • 12. Phishing Attacks Personal emails often don’t have the same level of protection as enterprise email solutions. Unfamiliar Websites Reports show cyber attackers taking advantage of the COVID-19 situation to spread malware. You should never need to download something in order to view an online map. Train your employees!
  • 13. What can your employees do?
  • 14. Update your computer’s operating system • Check the version of Windows you have • Windows 7 is now end-of-life, which means no more security patches! • Install the latest patches Update your web browser • Go to the vendor’s website and find out how Install or update antivirus software • Good options include Webroot, BitDefender, Norton, McAfee • Make certain virus signatures are up to date! Secure Their Computers
  • 15. Secure WiFi routers or firewalls • Update the device firmware • Change default admin password • Disable remote management • Instructions on vendor's website Update Internet-connected devices • Google Nest, security system, toaster, etc. Secure Their Networks
  • 16. Copy local documents back into your organization’s environment. Common tools include (Organization controlled): • OneDrive / SharePoint • Google Drive • Citrix ShareFile • Box • DropBox • VPN Backup Your Data
  • 17. If you see a suspicious email, link, or website, share it through the proper channels. Communicate Suspicious Activity
  • 18. 1. Secure The Computer 2. Secure The Network 3. Provide quality remote access solutions 4. Enable Multifactor Authentication 5. Backup The Data 6. Communicate Suspicious Activity 7. Be Click Cautious Review
  • 19. Click cautious > click curious Thank you and stay safe! Learn more at VC3.com joe.howland@vc3.com