SlideShare a Scribd company logo
How to Secure a Safe Teleworking Environment
John Robertson, Market Executive
https://www.hargray.com/savannah-ga
Outline
o Managing Security
Responsibilities
o Updates, Patches and Scans
o Enforcing Password Protection
o Phishing Attacks
o WiFi, Routers & Connections
o Where the “Work” Should Reside
o Hargray Smart Office
o Additional Best Practices
Managing Security Responsibilities
• Create a brief telework-related security policy
that clearly sets expectations and parameters
for working at home
• This policy relinquishes confusion regarding
responsibilities and do’s
and don’ts
For example:
• What devices should the work be
conducted on?
• How should emails be handled?
• Should work be done through VPN, cloud or
other methods?
Updates, Patches and Scans
Perform Regular Device Scans and Updates
• Remote and Teleworking Employees connect to
the business network
• Possibly compromising documents/network
integrity via malware, phishing attacks or
exposure to unsecured public WIFI
• Occasional device scans make sure laptops
and phones aren’t carrying any
hidden viruses
• Keep security software up-to-date
• Keep your Office365 and other apps up to date
and set them to automatically update (so
security patches are not missed)
Enforce Password Protection
• Make sure passwords are long, strong and unique:
• 12+ characters with mix of numbers / symbols /
capital and lowercase letters
• A strong password combines four or five words:
• Easily recalled by user but difficult to guess
• Verification timeout:
• Any website portal, app or software should
require reauthentication for idle and new
log-on attempts
• Don’t print / leave password or pins on paper:
• Printed, wrote or emailed pose a greater risk
• Multi-factor authentication:
• VPNs and encryption software play an intricate
role protecting intellectual property
Phishing, Smishing & Vishing
• Phishing is a cybercrime tactic that lures users into
clicking bait disguised as something trustworthy,
usually within emails.
• Spear phishing:
• Individualizes the email creating belief that it
is trustworthy to receiver
• Whaling:
• Directed toward CEOs or employees with
access to high-stakes information
• Smishing and vishing
• Forms of phishing through the phone SMS and
voice calling.
• Smishing uses text messaging, or SMS
WiFi, Routers & Connections
• Secure your home network.
• Turn on Encryption
• Make sure router software is updated
• Create Long, complex router password for
your home WIFI
• Ensure system firewalls are active on
your router
• Use a reliable site-to-site Virtual Private
Network (VPN) for internet or a secure
remote service
• Supply employees with mobile hotspots for
highly sensitive information
Where the “work” should reside
• Keep it in the cloud:
• Clouds provide a centralized location
where documents can live in perpetuity
• Add additional security authentication layers
to company data on mobile devices –
certainly if your company data is sensitive.
• Set up restrictions to keep unknown/
unnecessary browser extensions from being
installed to company laptops
• Consider providing company-owned devices
for employees to use
• Maintained and secured more
effectively
Smart Office
• Enjoy the benefits of collaboration
• Employees can connect seamlessly from
anywhere with an internet connection
• Spend as you go
• Requires no capital expenditures and is
simply billed by the month
• Costs are predictable and flexible
• No hidden fees or strings attached
• Simplify Business Operations
• Outsource your communications to Hargray
• Receive a 24/7 help desk
• Old Technology vs. New
• Never "outgrow" your phone system
• Add as many employees as you need along
with the latest technology enhancements
with no additional cost
• Protect Your Business
• Web-enabled and can be securely accessed
from anywhere with an internet connection
to keep your business going
Some additional best practices
• Turn off networking capabilities (Bluetooth)
• When not necessary for work
• Don’t click on links from external / suspicious
email accounts
• Hover over the link first
• Verify the source of every URL:
• Ensure the programs or apps originate from
a trusted source
• Use multi-factor authentication:
• Multi-layer protection
• Use extreme caution with unknown USBs
• USB devices can house harmful malware
• Digital viruses spread much like physical ones:
• your mistake(s) impact the broader Hargray
community
How to Secure a Safe Teleworking Environment

More Related Content

What's hot

Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
Hem Infotech
 
Introduction to Web Technologies
Introduction to Web Technologies Introduction to Web Technologies
Introduction to Web Technologies
KATHEESKUMAR S
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
CyberGuider IT Services Inc.
 
Peters foods presentation 04 12
Peters foods presentation 04 12Peters foods presentation 04 12
Peters foods presentation 04 12
ashleyiras
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
MultiTech IT
 
How to protect businesses from email hacking
How to protect businesses from email hackingHow to protect businesses from email hacking
How to protect businesses from email hacking
Sherin Thomas
 
Outcome 4 office technologies
Outcome 4 office technologiesOutcome 4 office technologies
Outcome 4 office technologies
Marcus McGowan
 
5 things that could get your business hacked
5 things that could get your business hacked5 things that could get your business hacked
5 things that could get your business hacked
Mike Ward
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
Tempered
 
Features of insurance broker software
Features of insurance broker softwareFeatures of insurance broker software
Features of insurance broker software
Hafiza Shaheera
 
MADS6638
MADS6638MADS6638
MADS6638
Carlos G. Gomez
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Kareo
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
It Security
It SecurityIt Security
It Security
Farid Rahimov
 
VoIP: Reasons Your Business Should Switch to Internet Phone Calls
VoIP: Reasons Your Business Should Switch to Internet Phone CallsVoIP: Reasons Your Business Should Switch to Internet Phone Calls
VoIP: Reasons Your Business Should Switch to Internet Phone Calls
SwiftTech Solutions, Inc.
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
Ernest Staats
 
Lync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disasterLync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disaster
Modrus
 

What's hot (19)

Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 
Introduction to Web Technologies
Introduction to Web Technologies Introduction to Web Technologies
Introduction to Web Technologies
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Peters foods presentation 04 12
Peters foods presentation 04 12Peters foods presentation 04 12
Peters foods presentation 04 12
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
How to protect businesses from email hacking
How to protect businesses from email hackingHow to protect businesses from email hacking
How to protect businesses from email hacking
 
Outcome 4 office technologies
Outcome 4 office technologiesOutcome 4 office technologies
Outcome 4 office technologies
 
5 things that could get your business hacked
5 things that could get your business hacked5 things that could get your business hacked
5 things that could get your business hacked
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
Features of insurance broker software
Features of insurance broker softwareFeatures of insurance broker software
Features of insurance broker software
 
MADS6638
MADS6638MADS6638
MADS6638
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
It Security
It SecurityIt Security
It Security
 
VoIP: Reasons Your Business Should Switch to Internet Phone Calls
VoIP: Reasons Your Business Should Switch to Internet Phone CallsVoIP: Reasons Your Business Should Switch to Internet Phone Calls
VoIP: Reasons Your Business Should Switch to Internet Phone Calls
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Lync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disasterLync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disaster
 

Similar to How to secure a safe teleworking environment

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
Erick Solms
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
 
6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software
MyCase Legal Case and Practice Management Software
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
cschlein
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Amazon Web Services
 
Applications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batchApplications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batch
RAHUL GUPTA
 
bcomclasscond.pptx
bcomclasscond.pptxbcomclasscond.pptx
bcomclasscond.pptx
AthulyaRamachandran2
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
Ultimate Multimedia Consult
 
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_NiemelaTietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Valtiokonttori / Statskontoret / State Treasury of Finland
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
April Mardock CISSP
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
fmb_cloud_computing.pptx
fmb_cloud_computing.pptxfmb_cloud_computing.pptx
fmb_cloud_computing.pptx
MrArrow3
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
Nikec Solutions
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
nado-web
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar to How to secure a safe teleworking environment (20)

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Secure End User
Secure End UserSecure End User
Secure End User
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Applications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batchApplications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batch
 
bcomclasscond.pptx
bcomclasscond.pptxbcomclasscond.pptx
bcomclasscond.pptx
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_NiemelaTietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
 
Maximize the Cloud Today
Maximize the Cloud TodayMaximize the Cloud Today
Maximize the Cloud Today
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
fmb_cloud_computing.pptx
fmb_cloud_computing.pptxfmb_cloud_computing.pptx
fmb_cloud_computing.pptx
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

More from LCpublicrelations

Hinesville Area Metropolitan Transportation Plan
Hinesville Area Metropolitan Transportation PlanHinesville Area Metropolitan Transportation Plan
Hinesville Area Metropolitan Transportation Plan
LCpublicrelations
 
January Newsletter
January NewsletterJanuary Newsletter
January Newsletter
LCpublicrelations
 
June 21 2023 - Social Media Strategy.pptx
June 21 2023 - Social Media Strategy.pptxJune 21 2023 - Social Media Strategy.pptx
June 21 2023 - Social Media Strategy.pptx
LCpublicrelations
 
COL Ramirez - State of the Garrison 2023
COL Ramirez - State of the Garrison 2023COL Ramirez - State of the Garrison 2023
COL Ramirez - State of the Garrison 2023
LCpublicrelations
 
COL Ramirez State of the Garrison
COL Ramirez State of the GarrisonCOL Ramirez State of the Garrison
COL Ramirez State of the Garrison
LCpublicrelations
 
Office and Time Management
Office and Time ManagementOffice and Time Management
Office and Time Management
LCpublicrelations
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
LCpublicrelations
 
ESPLOST
ESPLOSTESPLOST
Beyond Facebook Marketing
Beyond Facebook MarketingBeyond Facebook Marketing
Beyond Facebook Marketing
LCpublicrelations
 
2020 State of Liberty County Address
2020 State of Liberty County Address2020 State of Liberty County Address
2020 State of Liberty County Address
LCpublicrelations
 
Community brief
Community brief Community brief
Community brief
LCpublicrelations
 
TSPLOST
TSPLOSTTSPLOST
Liberty County Census Overview Presentation 2020
Liberty County Census Overview Presentation 2020Liberty County Census Overview Presentation 2020
Liberty County Census Overview Presentation 2020
LCpublicrelations
 
Office and Time Management 2020
Office and Time Management 2020Office and Time Management 2020
Office and Time Management 2020
LCpublicrelations
 
Progress Through People Luncheon-PC Simonton & LCDA
Progress Through People Luncheon-PC Simonton & LCDAProgress Through People Luncheon-PC Simonton & LCDA
Progress Through People Luncheon-PC Simonton & LCDA
LCpublicrelations
 
Liberty County Chamber of Commerce Presentation
Liberty County Chamber of Commerce PresentationLiberty County Chamber of Commerce Presentation
Liberty County Chamber of Commerce Presentation
LCpublicrelations
 
Progress Through People Luncheon Georgia's Evolving Demographics
Progress Through People Luncheon Georgia's Evolving DemographicsProgress Through People Luncheon Georgia's Evolving Demographics
Progress Through People Luncheon Georgia's Evolving Demographics
LCpublicrelations
 
Progress Through People Luncheon Board of Education 2019 Update
Progress Through People Luncheon Board of Education 2019 UpdateProgress Through People Luncheon Board of Education 2019 Update
Progress Through People Luncheon Board of Education 2019 Update
LCpublicrelations
 
Board of Commissioners
Board of CommissionersBoard of Commissioners
Board of Commissioners
LCpublicrelations
 
Command Brief
Command BriefCommand Brief
Command Brief
LCpublicrelations
 

More from LCpublicrelations (20)

Hinesville Area Metropolitan Transportation Plan
Hinesville Area Metropolitan Transportation PlanHinesville Area Metropolitan Transportation Plan
Hinesville Area Metropolitan Transportation Plan
 
January Newsletter
January NewsletterJanuary Newsletter
January Newsletter
 
June 21 2023 - Social Media Strategy.pptx
June 21 2023 - Social Media Strategy.pptxJune 21 2023 - Social Media Strategy.pptx
June 21 2023 - Social Media Strategy.pptx
 
COL Ramirez - State of the Garrison 2023
COL Ramirez - State of the Garrison 2023COL Ramirez - State of the Garrison 2023
COL Ramirez - State of the Garrison 2023
 
COL Ramirez State of the Garrison
COL Ramirez State of the GarrisonCOL Ramirez State of the Garrison
COL Ramirez State of the Garrison
 
Office and Time Management
Office and Time ManagementOffice and Time Management
Office and Time Management
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
 
ESPLOST
ESPLOSTESPLOST
ESPLOST
 
Beyond Facebook Marketing
Beyond Facebook MarketingBeyond Facebook Marketing
Beyond Facebook Marketing
 
2020 State of Liberty County Address
2020 State of Liberty County Address2020 State of Liberty County Address
2020 State of Liberty County Address
 
Community brief
Community brief Community brief
Community brief
 
TSPLOST
TSPLOSTTSPLOST
TSPLOST
 
Liberty County Census Overview Presentation 2020
Liberty County Census Overview Presentation 2020Liberty County Census Overview Presentation 2020
Liberty County Census Overview Presentation 2020
 
Office and Time Management 2020
Office and Time Management 2020Office and Time Management 2020
Office and Time Management 2020
 
Progress Through People Luncheon-PC Simonton & LCDA
Progress Through People Luncheon-PC Simonton & LCDAProgress Through People Luncheon-PC Simonton & LCDA
Progress Through People Luncheon-PC Simonton & LCDA
 
Liberty County Chamber of Commerce Presentation
Liberty County Chamber of Commerce PresentationLiberty County Chamber of Commerce Presentation
Liberty County Chamber of Commerce Presentation
 
Progress Through People Luncheon Georgia's Evolving Demographics
Progress Through People Luncheon Georgia's Evolving DemographicsProgress Through People Luncheon Georgia's Evolving Demographics
Progress Through People Luncheon Georgia's Evolving Demographics
 
Progress Through People Luncheon Board of Education 2019 Update
Progress Through People Luncheon Board of Education 2019 UpdateProgress Through People Luncheon Board of Education 2019 Update
Progress Through People Luncheon Board of Education 2019 Update
 
Board of Commissioners
Board of CommissionersBoard of Commissioners
Board of Commissioners
 
Command Brief
Command BriefCommand Brief
Command Brief
 

Recently uploaded

Community Skills Building Workshop | PMI Silver Spring Chapter | June 12, 2024
Community Skills Building Workshop | PMI Silver Spring Chapter  | June 12, 2024Community Skills Building Workshop | PMI Silver Spring Chapter  | June 12, 2024
Community Skills Building Workshop | PMI Silver Spring Chapter | June 12, 2024
Hector Del Castillo, CPM, CPMM
 
Connect to Grow: The power of building networks
Connect to Grow: The power of building networksConnect to Grow: The power of building networks
Connect to Grow: The power of building networks
Eirini SYKA-LERIOTI
 
美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】
美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】
美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】
balliuvilla512
 
Khushi Saini, An Intern from The Sparks Foundation
Khushi Saini, An Intern from The Sparks FoundationKhushi Saini, An Intern from The Sparks Foundation
Khushi Saini, An Intern from The Sparks Foundation
khushisaini0924
 
欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】
mukeshomran942
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
cahgading001
 
办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样
办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样
办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样
kkkkr4pg
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 
一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理
一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理
一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理
cenaws
 
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
nguqayx
 
美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】
美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】
美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】
ahmedendrise81
 
按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理
按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理
按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理
evnum
 
一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理
一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理
一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理
gnokue
 
欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】
欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】
欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】
ahmedendrise81
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
SocMediaFin - Joyce Sullivan
 
一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理
一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理
一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理
1wful2fm
 
一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理
一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理
一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理
aweuwyo
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】
欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】
欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】
karimimorine448
 
按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理
按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理
按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理
evnum
 

Recently uploaded (20)

Community Skills Building Workshop | PMI Silver Spring Chapter | June 12, 2024
Community Skills Building Workshop | PMI Silver Spring Chapter  | June 12, 2024Community Skills Building Workshop | PMI Silver Spring Chapter  | June 12, 2024
Community Skills Building Workshop | PMI Silver Spring Chapter | June 12, 2024
 
Connect to Grow: The power of building networks
Connect to Grow: The power of building networksConnect to Grow: The power of building networks
Connect to Grow: The power of building networks
 
美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】
美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】
美洲杯投注-美洲杯投注比分-美洲杯投注比分投注|【​网址​🎉ac44.net🎉​】
 
Khushi Saini, An Intern from The Sparks Foundation
Khushi Saini, An Intern from The Sparks FoundationKhushi Saini, An Intern from The Sparks Foundation
Khushi Saini, An Intern from The Sparks Foundation
 
欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯投注-欧洲杯投注投注官方网站-欧洲杯投注买球投注官网|【​网址​🎉ac99.net🎉​】
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
 
办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样
办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样
办理阿卡迪亚大学毕业证(uvic毕业证)本科文凭证书原版一模一样
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 
一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理
一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理
一比一原版坎特伯雷大学毕业证(UC毕业证书)学历如何办理
 
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
 
美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】
美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】
美洲杯买球-美洲杯买球下注平台-美洲杯买球投注平台|【​网址​🎉ac55.net🎉​】
 
按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理
按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理
按照学校原版(ArtEZ文凭证书)ArtEZ艺术学院毕业证快速办理
 
一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理
一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理
一比一原版(surrey毕业证书)英国萨里大学毕业证成绩单修改如何办理
 
欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】
欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】
欧洲杯买球-欧洲杯买球买球推荐-欧洲杯买球买球推荐网站|【​网址​🎉ac10.net🎉​】
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
 
一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理
一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理
一比一原版美国西北大学毕业证(NWU毕业证书)学历如何办理
 
一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理
一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理
一比一原版(uwm毕业证书)美国威斯康星大学密尔沃基分校毕业证如何办理
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】
欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】
欧洲杯外围-欧洲杯外围赛程-欧洲杯外围压注|【​网址​🎉ac99.net🎉​】
 
按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理
按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理
按照学校原版(UofT文凭证书)多伦多大学毕业证快速办理
 

How to secure a safe teleworking environment

  • 1. How to Secure a Safe Teleworking Environment John Robertson, Market Executive https://www.hargray.com/savannah-ga
  • 2. Outline o Managing Security Responsibilities o Updates, Patches and Scans o Enforcing Password Protection o Phishing Attacks o WiFi, Routers & Connections o Where the “Work” Should Reside o Hargray Smart Office o Additional Best Practices
  • 3. Managing Security Responsibilities • Create a brief telework-related security policy that clearly sets expectations and parameters for working at home • This policy relinquishes confusion regarding responsibilities and do’s and don’ts For example: • What devices should the work be conducted on? • How should emails be handled? • Should work be done through VPN, cloud or other methods?
  • 4. Updates, Patches and Scans Perform Regular Device Scans and Updates • Remote and Teleworking Employees connect to the business network • Possibly compromising documents/network integrity via malware, phishing attacks or exposure to unsecured public WIFI • Occasional device scans make sure laptops and phones aren’t carrying any hidden viruses • Keep security software up-to-date • Keep your Office365 and other apps up to date and set them to automatically update (so security patches are not missed)
  • 5. Enforce Password Protection • Make sure passwords are long, strong and unique: • 12+ characters with mix of numbers / symbols / capital and lowercase letters • A strong password combines four or five words: • Easily recalled by user but difficult to guess • Verification timeout: • Any website portal, app or software should require reauthentication for idle and new log-on attempts • Don’t print / leave password or pins on paper: • Printed, wrote or emailed pose a greater risk • Multi-factor authentication: • VPNs and encryption software play an intricate role protecting intellectual property
  • 6. Phishing, Smishing & Vishing • Phishing is a cybercrime tactic that lures users into clicking bait disguised as something trustworthy, usually within emails. • Spear phishing: • Individualizes the email creating belief that it is trustworthy to receiver • Whaling: • Directed toward CEOs or employees with access to high-stakes information • Smishing and vishing • Forms of phishing through the phone SMS and voice calling. • Smishing uses text messaging, or SMS
  • 7. WiFi, Routers & Connections • Secure your home network. • Turn on Encryption • Make sure router software is updated • Create Long, complex router password for your home WIFI • Ensure system firewalls are active on your router • Use a reliable site-to-site Virtual Private Network (VPN) for internet or a secure remote service • Supply employees with mobile hotspots for highly sensitive information
  • 8. Where the “work” should reside • Keep it in the cloud: • Clouds provide a centralized location where documents can live in perpetuity • Add additional security authentication layers to company data on mobile devices – certainly if your company data is sensitive. • Set up restrictions to keep unknown/ unnecessary browser extensions from being installed to company laptops • Consider providing company-owned devices for employees to use • Maintained and secured more effectively
  • 9. Smart Office • Enjoy the benefits of collaboration • Employees can connect seamlessly from anywhere with an internet connection • Spend as you go • Requires no capital expenditures and is simply billed by the month • Costs are predictable and flexible • No hidden fees or strings attached • Simplify Business Operations • Outsource your communications to Hargray • Receive a 24/7 help desk • Old Technology vs. New • Never "outgrow" your phone system • Add as many employees as you need along with the latest technology enhancements with no additional cost • Protect Your Business • Web-enabled and can be securely accessed from anywhere with an internet connection to keep your business going
  • 10. Some additional best practices • Turn off networking capabilities (Bluetooth) • When not necessary for work • Don’t click on links from external / suspicious email accounts • Hover over the link first • Verify the source of every URL: • Ensure the programs or apps originate from a trusted source • Use multi-factor authentication: • Multi-layer protection • Use extreme caution with unknown USBs • USB devices can house harmful malware • Digital viruses spread much like physical ones: • your mistake(s) impact the broader Hargray community
  • 11. How to Secure a Safe Teleworking Environment

Editor's Notes

  1. The telework-related security policy is meant to set expectations and parameters for working at home and to be sensitive to individual rights to personal privacy, but at the same time protect company information. Security measures in a telework environment should cover information systems and technology, and all other aspects of the information systems used by the employee, including paper files, other media, storage devices, and telecommunications equipment (e.g., laptops, PDAs, and cell phones). It is important to remember that just because employees are working from home or another approved alternate location, it is their responsibility to protect and manage the records and other sensitive company information stored on telework devices and transmitted across external networks. Employees who telework from home need to keep company property and information safe, secure, and separated from their personal property and information. (adopted from https://www.telework.gov/guidance-legislation/telework-guidance/security-it/ )
  2. Security patches, updates not only to operating systems (like Windows 10 and iOS), but to desktop apps like Office365 and other software will be one part of a strong system of protection against only hacks and cyber attack. There is a hacker attack every 39 seconds that affects one in three Americans every year (https://www.securitymagazine.com/articles/87787-hackers-attack-every-39-seconds) 43% of cyber attacks target small business (https://www.fundera.com/resources/small-business-cyber-security-statistics) Remember during this time of heightened dependency on digital infrastructure raises the cost of failure even on the smallest level
  3. Some of the above is sourced from https://www.appliedi.net/blog/13-security-requirements-for-telecommuting-and-remote-employees/ Also sourced https://pages.nist.gov/800-63-3/sp800-63b.html#appA from The National Institute of Standards and Technology (NIST) password managers such as LastPass or Dashlane can keep track of those complex passwords far more securely than writing them down.
  4. Phishing is a cybercrime tactic that lures users into clicking bait disguised as something trustworthy, usually within emails. The result often causes the computer to download malware from unprotected or fake websites. Spear phishing is more focused than phishing. It uses individualized ruses, so the target feels the email is unique to them and thus is more inclined to act immediately. Spear phishing typically uses information found on social media, stolen in a data breach, or from a previous phishing attempt to illustrate a connection or known entity—anything that takes a user’s guard down by feigning legitimacy. Whaling is more focused yet, and generally directed toward CEOs or employees with access to high-stakes information or accounts. Before the whaling email arrives, criminals perform profile research on the CEO so the email can target them specifically—and more convincingly. A whaling attack may disguise itself as a frequent billing partner, perhaps requesting that a payment be sent to a different bank account than normal. Smishing and vishing are both forms of phishing, but instead of email, they’re delivered through phone services such as SMS and voice calling. Smishing uses text messaging, or SMS, and the user receives a text message asking them for private information or to click a link.  Cybercriminals exploit human weakness to penetrate systemic defenses. In a crisis situation, particularly if prolonged, people tend to make mistakes they would not have made otherwise. Online, making a mistake in terms of which link you click on or who you trust with your data can cost you dearly. The vast majority of cyberattacks - by some estimates, 98% - deploy social engineering methods. Cybercriminals are extremely creative in devising new ways to exploit users and technology to access passwords, networks and data, often capitalizing on popular topics and trends to tempt users into unsafe online behavior. (source: https://www.weforum.org/agenda/2020/03/coronavirus-pandemic-cybersecurity/) Phishing is a cybercrime tactic that lures users into clicking bait disguised as something trustworthy, usually within emails. The result often causes the computer to download malware from unprotected or fake websites.  Source: https://andersontech.com/learn/what-is-phishing/
  5. One of the best ways to keep your company data secure from local-network attacks is to keep your files and services on the cloud. A DMS (cloud file storage) ensures that your employees never download an infected file directly. And cloud-based collaboration platforms make telecommuting easy for your remote team members. As long as you work with secure reputable cloud providers, cloud work also makes backups, restorations, and integration easier. (sourced: https://www.appliedi.net/blog/13-securityy-requirements-for-telecommuting-and-remote-employees/) Set up restrictions to keep unknown or unnecessary browser extensions from being installed to company laptops. Many have tracking codes the user doesn’t know about, while others are used to spread malware. Stick with trusted and needed browser extensions only. (Source: https://andersontech.com/taking-work-home-secure/)
  6. Source: https://www.weforum.org/agenda/2020/03/coronavirus-pandemic-cybersecurity/ Keeping your company safe and providing remote work opportunities is an interesting balance of connectivity and tight security. By providing devices, training, and regular malware screening you can help remote employees and ensure company-wide data security.  (https://www.appliedi.net/blog/13-security-requirements-for-telecommuting-and-remote-employees/)
  7. Source: https://www.weforum.org/agenda/2020/03/coronavirus-pandemic-cybersecurity/ Keeping your company safe and providing remote work opportunities is an interesting balance of connectivity and tight security. By providing devices, training, and regular malware screening you can help remote employees and ensure company-wide data security.  (https://www.appliedi.net/blog/13-security-requirements-for-telecommuting-and-remote-employees/)