A key measure in slowing the spread of COVID-19 is social distancing, with many state and local governments now issuing mandatory shelter-in-place orders. This has resulted in IT teams scrambling to build work-from-home setups for entire companies practically overnight. As millions of people all over the world suddenly need to work remotely from their houses and apartments, we have witnessed the creation of the largest global remote workforce ever. But moving millions—or even tens—of employees, their computers, and their data from a secure office environment to the home—with minimal notice—presents tremendous data security risks, including simple technical glitches, accidental human error, and malicious/ransomware attacks. Below are our tips to help you cover your bases.
When setting up your new infrastructure, rely on trusted vendors that have economic stability and offer strong security protocols.
Set up a company-wide policy that automatically saves documents and data to Google’s G Suite or Microsoft O365. NOTE: With only 30 days of retention for files from these services, make sure you add a backup solution, such as StorageCraft Cloud Backup and match your backup frequency to the importance of the data.
Ensure network security with a tool like Rapid7, Tanium, or Crowdstrike that protects a laptop and the entire network, and also scans for viruses and ransomware as well as for suspicious connections to and from your company. Again: Redundancy is key. Store server backups onsite and also replicate those backups to the cloud. (Using a cloud provider with DRaaS capabilities will enable you to fail over the entire network, data, and applications should the need arise.)
Use remote connecting software such as Zoho Assist, ConnectWise ScreenConnect, or Logmein Rescue, which enables the helpdesk to see an employee’s screen and troubleshoot issues remotely.
Regularly test your backups and your ability to recover! While having a backup is important, being able to recover all data completely and quickly is absolutely critical for business continuity. Triple-down on phishing: a successful phishing scam can expose you to ransomware and render all your data useless. Test your network and your employees with tools like KnowBe4 to find the holes in your network protection and to train your employees in being able to spot phishing emails that lay the groundwork for a ransomware attack.
Provide, and enforce the use of, company-wide communications tools for instant messaging, video conferencing, and telephony that are secure. These tools (such as Microsoft Teams, GoToMeeting, and Jive softphone) ensure employees can stay productive, be social, and continue collaboration while still keeping the business secure.