10 essential tips for secure remote working
With COVID-19 causing disruption worldwide, many of our MSP partners have reached out to ask us for support securing their clients as they move to remote working. We’ve compiled this top ten list of essential steps that you need to take to keep your staff and customers safe.
Level 1 – essential first steps
- Enforce Multi-Factor Authentication (MFA)
- Use simple remote access technologies like SSL VPN and LogMeIn Pro that require MFA
- Don’t bypass MFA to ‘save time’
- Don’t allow direct access through to a Remote Desktop server or computer without requiring a VPN and MFA
- Shut down all open Remote Desktop ports on the firewall
- Restrict remote access to a limited geography
- Identify where your customers’ employees need to work remotely from
- Only allow remote access from those local geographies
- Standardize on a remote access technology
- Only allow one or two remote access technologies
- Make sure your team knows what is authorized
- Remind your customers to beware of cybercriminals sending fake emails from ‘IT’ with fake links to log in remotely
- Know who logged in from where
- Audit the remote access logs on at least a weekly basis
- Look for and investigate remote access during strange times of the day or from foreign geographic locations
- Alert on failed login attempts
- Be aware that cybercriminals have increased their brute force attacks on insecure remote access technologies
- Know who is trying to break in and take preventative actions to lock them out
- Disable local file sharing from personal assets (i.e. employee owned devices)
- Don’t allow users to transfer documents to their own personal assets
- Documents from personal assets could be infected with malware and ransomware
- Remind your customers – don’t click on email links!
- Avoid clicking on all email links, even from known senders unless you verify offline with the sender that it was sent from them and is safe
- Instead of clicking on a link in an email, open a new browser window and navigate directly to the site without copying and pasting the link
- Harden Windows operating systems and Office 365
- Make sure that all Windows operating systems have been hardened
- Once hardened, use test ransomware to prove all systems are protected against ransomware
- Close remote access vulnerabilities
- Know which vulnerabilities are exposed on firewalls, servers and Office 365
- Cybercriminals will be heavily attacking all exposed vulnerabilities for the next several months so don’t give them the opportunity to target you or your clients
- Prove backups are safe and working
- Ensure that all data (including cloud data) is backed up to at least one segregated environment in a different cloud or on a different network that isn’t connected through a VPN or direct network connection
- Perform a test recovery of the organization’s key systems
- Document how long the restore process takes
- Prioritize each system so you know which to recover first
Level 2 – sensible next steps
Want to drill down further and get first-hand advice on how to implement these crucial steps?
Then join us this Friday 20th March at 11am Eastern Time (ET) for our special COVID-19 Security Action Plan webinar to find out how.