SlideShare a Scribd company logo
NASEEMKHOODORUTH 1
WORK FROMHOME UNDER THE LOCKDOWN
#informationtechnology#cybersecurity#sophos#fortinet#microsoft#workfromhome#covid-19
#mauritius#staysafe #staycalm
FollowingmyexperienceinITfield the last18 years,workingfromhome duringthe periodof
confinement- covid-19,some advice below:
 On-premiseserversshouldbe wellprotected:
o Knownandproven antiviruswithransomware protection
o Regularbackupto tape (encrypted) androtatestooffsite - (thissituationmightbe
difficultduringlockdown)
o Cloudencryptedbackup(Azure backup –helpful whenyoucan’taccessthe office)
o Diskbackupand rotatesto offsite (encrypted)- (thissituationmightbe difficultduring
lockdown youcan have itencryptedin yourlocal networkapplicationsuchasVeeam
Backup andReplicationwithlongerrestore points)
o Configure notificationalertforyourservers,networkinfrastructure, backupandother
critical devices(example:PRTG) –be proactive andpreventive
 Providingusersremote connectionto workfromhome – I recommend SSLVPN highly
o Properrule configured forusers touse theirhome internetconnectionwhen connected
to VPN,if wronglyconfigured=whenconnectedtoVPN the internetwill gothroughthe
office WAN whichcancause saturation anddegradationof services
o Provide UserssecuredlaptoporPC,theycan evenbringsame to home as mostsecurity
shouldhave beencoveredforacompanyenterprise laptoporPC
o If usingHome computerswithSSL VPN,Iwill recommendthe companytoimplement
terminal serverswithgoodprotection,the userconnecttoVPN thenworkonthe
terminal server(Windowsserverremote desktopservices).
o Have the desktoporlaptopupto date withlatestpatchesandwindowsversion(latestis
windows10 1909) – try not to use outdate operatingsystemsuchasWindows7
 Office 365:
o Implementadvancedthreatprotectiontoavoidphishing,impersonation,spoofingand
spam emails(ATP),
o Have your email backuptoanothercloudvendorand storage locationacrossthe region
o MicrosoftTeam will be helpful toorganize meeting,share document,call conference,
planning,projectfollow-up
o Start usingand implementSharePointtomove yourlocal fileservertocloud withproper
securityanduseraccess
o Get Azure InformationProtectiontoencryptemail
o ImplementMFA andGeo-locationsign-inforadditionalsecurity(exampleyoucansign
into work email inMauritiusonly)
 Work fromhome
o Ensure your antivirusisupto date,keptthe company data as safe as youcan and share
whenrequiredonly
o Respondtogenuine email if youare unsure call the sendertoconfirm
o Encrypt yourlaptop,USB key and otherexternal devices
o Your mobile phone hascompanyemail configured –encryptyourmobile phone
NASEEMKHOODORUTH 2
WORK FROMHOME UNDER THE LOCKDOWN
o Try the maximumtonot share financial,creditcardinformationviaemail(If need be
encryptyouremail – thisservicesshouldbe implementbyyourcompanytobe able to
use example AZUREinformationprotection)
o Openemail attachmentfromknow senderssuchinvoice,compressed files
o Use internetforessential services(videostreaming,music,movies,torrent,peertopeer
or any otherapplicationthatuse highbandwidthwill saturate the internetconnectivity
= slow)
o Lock your desktopwhennotinuse
o Use VPN whenyouare working onlyandneedtoaccess date on the corporate network
(example:goingforlunch,awayfora time disconnectthe VPN connection
I have coverthe maximumIcan,hope it’shelpful foryou
Helpful link:
Protectingdatawhenworkingremotely:
https://www.slideshare.net/NaseemKhoodoruth/protecting-data-when-working-remotely
SetupSSL VPN forSophosXG Firewall withSSOforcorporate:
https://www.slideshare.net/NaseemKhoodoruth/sophos-xg-firewall-ssl-vpn-configuration
SetupSSL VPN withFortinetFirewallwithSSOforcorporate:
https://www.slideshare.net/NaseemKhoodoruth/fortinet-ssl-vpn-access

More Related Content

Similar to Work from home under the lockdown

Luigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxLuigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptx
FIWARE
 
Neo900: Crafting The Private Phone
Neo900: Crafting The Private PhoneNeo900: Crafting The Private Phone
Neo900: Crafting The Private Phone
Sebastian Krzyszkowiak
 
Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y Chan
Ken Chan
 
Cloud Security Practices and Principles
Cloud Security Practices and PrinciplesCloud Security Practices and Principles
Cloud Security Practices and Principles
Sumo Logic
 
Security plan
Security planSecurity plan
Security plan
OriginalGSM
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
ERPScan
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
imran6994
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
David Busby, CISSP
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
 
Automated Cloud-Native Incident Response with Kubernetes and Service Mesh
Automated Cloud-Native Incident Response with Kubernetes and Service MeshAutomated Cloud-Native Incident Response with Kubernetes and Service Mesh
Automated Cloud-Native Incident Response with Kubernetes and Service Mesh
Matt Turner
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
Dan Houser
 
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
CODE BLUE
 
Common NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themCommon NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid them
Greg Swedosh
 
Kernel Recipes 2017 - The state of kernel self-protection - Kees Cook
Kernel Recipes 2017 - The state of kernel self-protection - Kees CookKernel Recipes 2017 - The state of kernel self-protection - Kees Cook
Kernel Recipes 2017 - The state of kernel self-protection - Kees Cook
Anne Nicolas
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco Canada
 
Docker app armor_usecase
Docker app armor_usecaseDocker app armor_usecase
Docker app armor_usecase
Kazuki Omo
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
Cristian Garcia G.
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
NRB
 

Similar to Work from home under the lockdown (20)

Luigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxLuigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptx
 
Neo900: Crafting The Private Phone
Neo900: Crafting The Private PhoneNeo900: Crafting The Private Phone
Neo900: Crafting The Private Phone
 
Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y Chan
 
Cloud Security Practices and Principles
Cloud Security Practices and PrinciplesCloud Security Practices and Principles
Cloud Security Practices and Principles
 
Security plan
Security planSecurity plan
Security plan
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
 
Automated Cloud-Native Incident Response with Kubernetes and Service Mesh
Automated Cloud-Native Incident Response with Kubernetes and Service MeshAutomated Cloud-Native Incident Response with Kubernetes and Service Mesh
Automated Cloud-Native Incident Response with Kubernetes and Service Mesh
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
 
Common NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themCommon NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid them
 
Kernel Recipes 2017 - The state of kernel self-protection - Kees Cook
Kernel Recipes 2017 - The state of kernel self-protection - Kees CookKernel Recipes 2017 - The state of kernel self-protection - Kees Cook
Kernel Recipes 2017 - The state of kernel self-protection - Kees Cook
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Docker app armor_usecase
Docker app armor_usecaseDocker app armor_usecase
Docker app armor_usecase
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 

More from Naseem Khoodoruth

Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)
Naseem Khoodoruth
 
How to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live eventsHow to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live events
Naseem Khoodoruth
 
How to install and use microsoft teams for beginners
How to install and use microsoft teams for beginnersHow to install and use microsoft teams for beginners
How to install and use microsoft teams for beginners
Naseem Khoodoruth
 
Sophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN ConfigurationSophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN Configuration
Naseem Khoodoruth
 
Fortinet SSL VPN access
Fortinet SSL VPN accessFortinet SSL VPN access
Fortinet SSL VPN access
Naseem Khoodoruth
 
Powershell direct
Powershell directPowershell direct
Powershell direct
Naseem Khoodoruth
 
Exchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell CommandExchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell Command
Naseem Khoodoruth
 
Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)
Naseem Khoodoruth
 
Implementation of Scom 2016
Implementation of Scom 2016 Implementation of Scom 2016
Implementation of Scom 2016
Naseem Khoodoruth
 
Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0
Naseem Khoodoruth
 
Backup Exec 15 VSEPlus
Backup Exec 15 VSEPlusBackup Exec 15 VSEPlus
Backup Exec 15 VSEPlus
Naseem Khoodoruth
 
Backup Exec 15 VSE
Backup Exec 15 VSEBackup Exec 15 VSE
Backup Exec 15 VSE
Naseem Khoodoruth
 
CP250915V3.1EL14818
CP250915V3.1EL14818CP250915V3.1EL14818
CP250915V3.1EL14818
Naseem Khoodoruth
 
DSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDFDSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDF
Naseem Khoodoruth
 
MCSA Office 365
MCSA Office 365MCSA Office 365
MCSA Office 365
Naseem Khoodoruth
 

More from Naseem Khoodoruth (15)

Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)
 
How to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live eventsHow to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live events
 
How to install and use microsoft teams for beginners
How to install and use microsoft teams for beginnersHow to install and use microsoft teams for beginners
How to install and use microsoft teams for beginners
 
Sophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN ConfigurationSophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN Configuration
 
Fortinet SSL VPN access
Fortinet SSL VPN accessFortinet SSL VPN access
Fortinet SSL VPN access
 
Powershell direct
Powershell directPowershell direct
Powershell direct
 
Exchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell CommandExchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell Command
 
Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)
 
Implementation of Scom 2016
Implementation of Scom 2016 Implementation of Scom 2016
Implementation of Scom 2016
 
Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0
 
Backup Exec 15 VSEPlus
Backup Exec 15 VSEPlusBackup Exec 15 VSEPlus
Backup Exec 15 VSEPlus
 
Backup Exec 15 VSE
Backup Exec 15 VSEBackup Exec 15 VSE
Backup Exec 15 VSE
 
CP250915V3.1EL14818
CP250915V3.1EL14818CP250915V3.1EL14818
CP250915V3.1EL14818
 
DSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDFDSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDF
 
MCSA Office 365
MCSA Office 365MCSA Office 365
MCSA Office 365
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Work from home under the lockdown

  • 1. NASEEMKHOODORUTH 1 WORK FROMHOME UNDER THE LOCKDOWN #informationtechnology#cybersecurity#sophos#fortinet#microsoft#workfromhome#covid-19 #mauritius#staysafe #staycalm FollowingmyexperienceinITfield the last18 years,workingfromhome duringthe periodof confinement- covid-19,some advice below:  On-premiseserversshouldbe wellprotected: o Knownandproven antiviruswithransomware protection o Regularbackupto tape (encrypted) androtatestooffsite - (thissituationmightbe difficultduringlockdown) o Cloudencryptedbackup(Azure backup –helpful whenyoucan’taccessthe office) o Diskbackupand rotatesto offsite (encrypted)- (thissituationmightbe difficultduring lockdown youcan have itencryptedin yourlocal networkapplicationsuchasVeeam Backup andReplicationwithlongerrestore points) o Configure notificationalertforyourservers,networkinfrastructure, backupandother critical devices(example:PRTG) –be proactive andpreventive  Providingusersremote connectionto workfromhome – I recommend SSLVPN highly o Properrule configured forusers touse theirhome internetconnectionwhen connected to VPN,if wronglyconfigured=whenconnectedtoVPN the internetwill gothroughthe office WAN whichcancause saturation anddegradationof services o Provide UserssecuredlaptoporPC,theycan evenbringsame to home as mostsecurity shouldhave beencoveredforacompanyenterprise laptoporPC o If usingHome computerswithSSL VPN,Iwill recommendthe companytoimplement terminal serverswithgoodprotection,the userconnecttoVPN thenworkonthe terminal server(Windowsserverremote desktopservices). o Have the desktoporlaptopupto date withlatestpatchesandwindowsversion(latestis windows10 1909) – try not to use outdate operatingsystemsuchasWindows7  Office 365: o Implementadvancedthreatprotectiontoavoidphishing,impersonation,spoofingand spam emails(ATP), o Have your email backuptoanothercloudvendorand storage locationacrossthe region o MicrosoftTeam will be helpful toorganize meeting,share document,call conference, planning,projectfollow-up o Start usingand implementSharePointtomove yourlocal fileservertocloud withproper securityanduseraccess o Get Azure InformationProtectiontoencryptemail o ImplementMFA andGeo-locationsign-inforadditionalsecurity(exampleyoucansign into work email inMauritiusonly)  Work fromhome o Ensure your antivirusisupto date,keptthe company data as safe as youcan and share whenrequiredonly o Respondtogenuine email if youare unsure call the sendertoconfirm o Encrypt yourlaptop,USB key and otherexternal devices o Your mobile phone hascompanyemail configured –encryptyourmobile phone
  • 2. NASEEMKHOODORUTH 2 WORK FROMHOME UNDER THE LOCKDOWN o Try the maximumtonot share financial,creditcardinformationviaemail(If need be encryptyouremail – thisservicesshouldbe implementbyyourcompanytobe able to use example AZUREinformationprotection) o Openemail attachmentfromknow senderssuchinvoice,compressed files o Use internetforessential services(videostreaming,music,movies,torrent,peertopeer or any otherapplicationthatuse highbandwidthwill saturate the internetconnectivity = slow) o Lock your desktopwhennotinuse o Use VPN whenyouare working onlyandneedtoaccess date on the corporate network (example:goingforlunch,awayfora time disconnectthe VPN connection I have coverthe maximumIcan,hope it’shelpful foryou Helpful link: Protectingdatawhenworkingremotely: https://www.slideshare.net/NaseemKhoodoruth/protecting-data-when-working-remotely SetupSSL VPN forSophosXG Firewall withSSOforcorporate: https://www.slideshare.net/NaseemKhoodoruth/sophos-xg-firewall-ssl-vpn-configuration SetupSSL VPN withFortinetFirewallwithSSOforcorporate: https://www.slideshare.net/NaseemKhoodoruth/fortinet-ssl-vpn-access