How To Secure Your Business When Remote Working • Blisstech Solutions

The global COVID-19 crisis means that more people are remote working than ever before.  Businesses rushed to enable their employees to work from anywhere very quickly, which may include access to sensitive company data.  In the rush to stay operational during the crisis, it can be easy to overlook security in favour of convenience.  However, remote working can be done securely, and here are some key pointers to help you.

Secure Windows Remote Desktop

A quick way of enabling remote working is to enable Windows Remote Desktop (RDP) and open port 3389 on the firewall.  BAD IDEA!  RDP has had a lot of security vulnerabilities associated with it and should not be exposed directly to the internet.  Use Remote Desktop Gateway or a VPN to protect the systems you want to provide access to while remote working.

Deploy a VPN

A VPN enables employees to make a secure connection into your internal network from anywhere.

The connection is encrypted between the remote computer and network so it can safely be used without fear of snooping.  For the employee,  it can appear to them as if they were connected directly to the internal business network.  You should consider adding multi-factor authentication to ensure that, if a user’s password is compromised, the connection is still protected.

Use Cloud-Based Systems

Using Software as a Service (SaaS) such as Microsoft 365, or other cloud-based systems, gives your business a huge amount of flexibility, and allows your employees to work anywhere.  SaaS solutions are based on centralised systems in the cloud, and because of this they also can offer better security when they are configured correctly, especially when combined with multi-factor authentication.  As company data and systems are available securely in the cloud, there is no need for users to take external copies of data or use shadow IT so they can work remotely.  All of this means you have control of where your data is and who can access it, so it is far less likely to be compromised.

Enable Multi-Factor Authentication

Multi-Factor Authentication (MFA, but also known as 2FA) adds an additional ‘factor’ to the login, in addition to the password.  This ‘factor’ is usually something that you have like a mobile phone, email address, or security token that provides and an extra code needed to log in.  You may be familiar with using this as it has become very popular recently, being used by banks, the UK Government website and many more.  You should consider adding MFA to any critical system exposed to the internet.   This includes, but is not limited to, VPN, email, CRM, accounting system and any other cloud-based system used to run your business.

Centrally Enforce Security Policies

Remote working can be bad for IT security.  When your users are not protected by your companies internal systems like firewalls, and are in the relaxed environment of their home they drop their guard.  Problems like using business issued systems for personal and family use can expose your business to additional threats.  You can use solutions from Sophos and Microsoft to centrally enforce your security policies to prevent this.

Update Your Systems

Having endpoint software up to date is key to ensuring that they are protected from known vulnerabilities and malware.  Having a strategy and systems in place to check and enforce anti-virus, Windows and other software updates means you know that your users’ endpoints are up-to-date and protected as much as possible.

Educate Your Users

A good remote working setup

Threats from phishing and other scams are at an all-time high, with hackers trying to take advantage of people’s fears about the coronavirus.  Employees need to be educated now more than ever.  Protection for the human layer comes down to training and education. Following the training, you need to keep users on their toes and there are services available that can automate this.

Have Remote Working Policies In Place

Clearly articulate what behaviour is expected, and not expected, to your remote workers.  If a user does something that puts your business at risk, you can’t reprimand them if you didn’t communicate policy.  You may also be able to enforce some of this policy (updates, web browsing, etc) using technology, but even if you can’t enforce it, you should explain what is, and what is not, allowed.

We can help

If you need any assistance with remote working more securely, or remote working full stop, please contact us on 01299 382 321 or get in touch through the website.

More Content

A woman on a laptop with a shield and lock on the screen

7 ways to secure small business IT

It is hard enough running a business without having to worry about how to ensure your computer systems and data are secure from bad guys.  To help you out, we have put together a list of the top 7 things that you should do to secure your small business IT systems. 1....

Tech Tip: Using Microsoft Teams Keyboard Shortcuts

Microsoft Teams is a great productivity tool. It has many features that can help you be more productive and speed up repetitive tasks. One way to be even more productive with Microsoft Teams is to use the shortcut keys. The shortcut keys can help you quickly access...

What to do when disaster strikes: Creating an Incident Response Plan

Your business has firewalls, the latest security software, multi-factor authentication, and, of course, uncrackable passwords. You may even have Cyber Essentials—high five. But… It’s still not enough to protect you from 100% of cyber attacks. Completely watertight...

Tech Tip: How to create a transcript using Word

Welcome to another Blisstech Solutions Tuesday Tech Tip! Are you tired of rewinding and pausing video or audio content just to jot down notes? Say goodbye to that tedious process and hello to a more efficient solution. In this tech tip video, we'll show you how to...

When can you finally forget your password?

Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.

What is Proactive Monitoring and how can it protect your business?

How proactive monitoring will help your business weather any storm. You are the captain of your business's ship. You have a loyal and skilled team behind you. You are ready for any challenge! Or so you thought. Then, one day, without warning, a vast digital monster...
Child working at a laptop

Donated Laptops for Lockdown Learning

A Digital Divide It is a shocking fact that 9% of children in the UK, between 1.1 and 1.8 million, do not have a computer, laptop or mobile device in their home, according to research carried out by Ofcom. This pandemic is shining a stark light on the gap in provision...

Tech Tip: How to use Microsoft Teams as a phone system

Welcome to a new Tuesday tech tip video. In it, I will demo the Microsoft Teams Phone system. Microsoft Teams has become a cornerstone for collaboration, offering seamless chat and meeting experiences for millions of users worldwide. But did you know that Teams can...
Ransomware threats are surging – here’s how to protect your business

Ransomware threats are surging – here’s how to protect your business

After years of decline, ransomware attacks are on the rise again. And more businesses are being targeted. It’s time to protect your data. Here we explain how.

Did you notice Incognito mode’s improved privacy?

Did you notice Incognito mode’s improved privacy?

If your team use Google Chrome’s Incognito mode, you probably assume your browsing is private. But until Microsoft spotted this big flaw, your info could be shared across devices… here’s how they’ve fixed it.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05