When considering network management and support, one of the key things to think about is how to monitor business infrastructure, such as servers, switches, routers and other elements.Read More
Here are some tips on how to minimise the risk of a security breach while working from home.
Strong passwordsEnforce all your users to have strong, unique passwords for each separate service and login they use. This also needs to apply to any devices that they use at home to deter access from unauthorised users. Follow the rule of 3 random words, numbers and symbols for each password.Top Tip: It's better to enforce a longer password length then it is to enforce changing your password every month (and much less annoying!)
Anti-VirusYou may be able to extend or deploy the managed anti-virus software that you have on your network to the remote devices. Doing this means that you can be sure of the level of protection that is in place and the device is scanned at a regular interval.Top Tip: Make sure you're using anti-virus software that's managed on the Cloud, it makes it easy to deploy and setup a separate policy for home workers.
UpdatesMake sure that all updates (like Windows and Office) are applied to make sure that any vulnerabilities are quickly resolved. This is more difficult to enforce on a device that is not part of the network but the ability for the updates to be downloaded and automatically applied can be put in place.Top Tip: Extend your device management to home devices with Microsoft Intune.
EncryptionWindows 10 Pro includes BitLocker that allows you to encrypt the end users laptop or PC. This means any data that is on the device is protected if it gets stolen or lost. Home devices most probably don’t have Windows 10 Pro unless they have taken them from the office.Most modern tablet and mobile devices can be password protected and doing so, encrypts the device. Its worth enforcing this on devices that are used for company purposes and if you have a number of devices, implementing something like Microsoft InTune to control such devices could be beneficial.Top Tip: Azure Information Protection automatically encrypts all documents that have a labelled applied.
Approved softwareCreate a list of approved software for all users that needs to be adhered to. This means that end users use a set list of software to standardise and to remove downloading third party or potentially compromised install files. Such an example would be Microsoft Teams for video conferencing rather than Zoom or Microsoft Office instead of Open Office.
Multi Factor AuthenticationMake sure that this is implemented and setup for access to company resources, Microsoft 365 and any other package that supports it. This ensures a higher level of security so the person actually accessing the data is the correct person.
Data transferUse a trusted, private system such as OneDrive to transfer data from one place to another. Don’t use USB drives unless they are encrypted as these are another potential security risk.
What else?Another thing to consider is how to control the data that the users have access to. We recommend Azure Information Protection that can prevent users from distributing, printing or e-mailing documents. You can use this to label documents or e-mails to stop them being copied, sent on to other users or printed. This is linked to Office 365 and needs some additional licences but is a good way of ensuring that even if the users have access to specific documents or e-mails on their home PC, they cannot send them outside the company network; you can even retract documents at will.There are lots of other things to be aware of, but these are the most common points. If you need a detailed summary or require a security audit of your network and working from home arrangements, please contact us.
Here at Datcom, we help many of our clients ensure their business data is backed up. Let’s look into why it’s worth considering if your business needs to evaluate its backup requirements.Read More
Microsoft has stopped official support for Windows 7, more importantly, you may not have heard that this was also the case for their Server 2008 and Server 2008 r2 operating systems. You will no longer receive software updates for either system, making your data vulnerable. What should you do about it?Read More