With an increasing number of states mandating that non-critical employees work from home, every company must confront the question of how they can maintain a reasonable level of cyber security while systems operations are disrupted and security personnel may be unable to work from their security operations center. Additionally, the rapidity with which the situation changed limited the time that companies had to make architectural changes to their network or to modify their operations to support a large work from home user base.
SANS put together a toolkit to help organizations educate themselves and their workforce in light of many of our new working environments…our homes.
It’s important to remember that while IT may be loosening some restrictions to allow an increased amount of remote access, basic security protections, detections and response efforts should not be loosened.
Watch Kroll’s work from home cyber security tips in the video below:
Kroll believes good hygiene, effective endpoint monitoring and ongoing cyber awareness communications are part of a solid foundation. Let’s consider the following to work more securely from home.
We’ve mentioned this in previous posts and believe it should be mentioned again. As we all look for more information, particularly on the current COVID-19 situation and the impositions on our daily life, social engineering and phishing is still one of the greatest risks to your users. Educate them now and often around current phishing trends and measures they can take to avoid clicking or opening malicious links and documents.
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.
Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
by Laurie Iacono, Keith Wojcieszek, George Glass
by Josh Mitchell, Paul Connolly