Keeping a Peaceful Home Office The 4 Essential Cybersecurity - - PowerPoint PPT Presentation

keeping a peaceful home office
SMART_READER_LITE
LIVE PREVIEW

Keeping a Peaceful Home Office The 4 Essential Cybersecurity - - PowerPoint PPT Presentation

Keeping a Peaceful Home Office The 4 Essential Cybersecurity Measures for Remote Work Were all a bit exhausted. You might be uncertain about: How employees are using their time while working from home How overall productivity will be


slide-1
SLIDE 1

Keeping a Peaceful Home Office

The 4 Essential Cybersecurity Measures for Remote Work

slide-2
SLIDE 2

We’re all a bit exhausted.

slide-3
SLIDE 3

You might be uncertain about:

  • How employees are using their time while working from home
  • How overall productivity will be affected
  • If more remote work means less social connection and a weaker culture
  • If your staff trusts that you have things under control
  • The security of your organization’s files and confidential information
slide-4
SLIDE 4

Today’s focus: The security of your organization’s files and confidential information

slide-5
SLIDE 5

Just as working from home isn’t just a temporary solution, cybersecurity is not just an issue now.

slide-6
SLIDE 6

Agenda

  • 1. The best ways to secure every employee’s workspace
  • 2. How you should teach your teams to identify real security risks
  • 3. What the Zero Trust Principle is, and if it’s the right approach for

your organization

  • 4. What a detailed & responsible WFH policy looks like

**Stay until the end for an exclusive WFH resource!

slide-7
SLIDE 7

Glenn Mudryk CEO

Speakers

Robert Craig IT Director

7

slide-8
SLIDE 8

0.

The Fundamentals of WFH

What you need to know before we dive in.

slide-9
SLIDE 9

Scenario A

Your remote workers use corporate laptops that are managed by your organization.

slide-10
SLIDE 10

Scenario B

Your remote workers use their own machines.

slide-11
SLIDE 11

Endpoint security measures often include anti- virus, application control, URL filtering, and other barriers to prevent hacking.

slide-12
SLIDE 12

Data leakage is harder to manage. Data can leak if an employee sends emails to the wrong people

  • r engages in risky behaviour.
slide-13
SLIDE 13

1.

Securing every workspace

How to treat home offices like the real office

slide-14
SLIDE 14

STEP 1) Set up remote access

Authorizing your employees to access their office computer and network from a geographical distance.

slide-15
SLIDE 15
slide-16
SLIDE 16

STEP 2) Keep worlds separate

Authorizing your employees to access their office computer and network from a geographical distance.

slide-17
SLIDE 17

Using personal devices for work creates problems around document preservation and adds increased risk.

slide-18
SLIDE 18

If you use remote access, your IT team should be:

  • Installing regular updates
  • Running antivirus scans
  • Blocking malicious sites
  • Transparent about their security measures
slide-19
SLIDE 19

Work data is for work devices.

Home data is for home devices.

slide-20
SLIDE 20

2.

Learn & teach security risks

Know your cybersecurity. Pass it on.

slide-21
SLIDE 21

STEP 1) Know the risks

slide-22
SLIDE 22

Identify and avoid phishing emails and websites.

slide-23
SLIDE 23

Avoid the use of personal email, file sharing or communication services, and always use business accounts.

slide-24
SLIDE 24

Avoid saving passwords, work-related emails or documents to personal email accounts, cloud databases and devices.

slide-25
SLIDE 25

Don’t leave devices and paper documents in vehicles, even for a short time, and even if the vehicle is locked.

slide-26
SLIDE 26

Don’t send sensitive information over email. Implement a secure means to sending specific types of sensitive information.

slide-27
SLIDE 27

Don’t use unsecured or public Wi-Fi while working.

slide-28
SLIDE 28

Be conscious of clicking links and downloading files, particularly from unsolicited and suspicious emails.

slide-29
SLIDE 29

Lock computers and paper documents when away from the desk, even if the home seems secure.

slide-30
SLIDE 30

Verify the security of electronic devices by updating software frequently, ideally with automatic updates.

slide-31
SLIDE 31

Only use work-approved software systems and communication platforms.

slide-32
SLIDE 32

STEP 2) Add WFH to your cybersecurity training

slide-33
SLIDE 33

Your cybersecurity workshop should:

  • Clearly communicate the potential impact of a cyber incident on your

business

  • Train your employees to recognize and respond to a cyber attack
  • Issue specific rules for email, internet browsing, social networks and

mobile devices

  • Plan for follow-up cybersecurity sessions (like lunch & learns or even an
  • nline forum)
slide-34
SLIDE 34

Update your cyber-incident response plan.

Data breaches can lead to lawsuits and fines, productivity loss, and serious reputational damage.

slide-35
SLIDE 35

STEP 2) Provide a take-home cybersecurity guide*

*Available after the presentation!

slide-36
SLIDE 36

3.

The Zero-Trust Principle

And what it means for your business

slide-37
SLIDE 37

In today’s world, the remote worker needs to be able to do everything they can do from their desk if you want your organization to remain productive and competitive …. … But allowing employees to access critical business systems and data from machines and networks you don’t manage or trust means the risk grows exponentially.

— Alex Willis

Blackberry Vice President of Sales Engineering

slide-38
SLIDE 38

The Zero-Trust Principle

Organizations should not automatically trust anything inside or outside its perimeters, and instead must verify anything and everything trying to connect to its systems before granting access.

slide-39
SLIDE 39

Some Zero-Trust measures

  • Multi-factor authentication
  • Encryption
  • Identity Access Management
  • Analytics
slide-40
SLIDE 40

Zero Trust is a transformation of infrastructure.

slide-41
SLIDE 41

4.

How to Create a WFH Policy

For a remote work-friendly future

slide-42
SLIDE 42

What is a Work-From-Home Policy (or Telecommuting Policy)?

slide-43
SLIDE 43

i) Questions to determine if telecommuting is appropriate

slide-44
SLIDE 44

ii) A procedure for requesting to work from home or remotely

slide-45
SLIDE 45

iii) Employment terms (in case working from home would have any effect on compensation or benefits)

slide-46
SLIDE 46

To determine if it’s appropriate to allow an employee to work from home, the policy should consider…

slide-47
SLIDE 47
  • What are acceptable reasons for telecommuting?
  • Is the employee eligible for regular telecommuting, by

nature of their job?

  • Does the employee have the necessary equipment or

software installed at home?

  • Will collaboration with the employee’s team suffer

greatly?

slide-48
SLIDE 48

We know that remote work is a big adjustment for many people.

slide-49
SLIDE 49

How we can help

1) Protecting your mission-critical business data in secure cloud storage

slide-50
SLIDE 50

How we can help

2) Securing your endpoints with Zero-Trust measures

slide-51
SLIDE 51

How we can help

2) Monitoring your network to prevent

  • utages (at the office and at home)
slide-52
SLIDE 52

Summary: The Four FIVE Essential Measures

  • 1. Secure every employee’s workspace
  • 2. Learn and teach cybersecurity risks
  • 3. Apply the Zero-Trust approach for digital transformation
  • 4. Create & enforce a WFH policy

The 5th and most important:

  • 5. Ask for professional help when you need it.
slide-53
SLIDE 53

Q&A

slide-54
SLIDE 54

Thanks for coming.