Deploying a remote workforce army

Deploying a remote workforce army

During this COVID-19 outbreak, businesses are looking at pandemic planning to secure the future of their business.

As the Coronavirus (COVID-19) outbreak sweeps the globe, many countries like the UK are in lockdown. These government measures have been put in place to slow down the spread of this pandemic and save as many lives as possible. In some cases, this could be as long as for up to 6months before UK life to returns to normal, but no one knows for sure just yet. The UK government will review the social distancing policy and lockdown measures every three weeks.

As a result, the UK government is advising against going outside, mixing with people outside your own household, or doing any form of non-essential travel to keep as many people safe as possible, and to maintain a 2-metre social distance in public.

For many businesses, this means effectively closing the doors and ceasing trading until the pandemic is over. For others, it’s a case of business as usual whilst adjusting their business model with some pandemic planning. This includes allowing employees where possible to work from home rather than commuting into the office. This, of course, is only applicable if employees have a job that can be carried out from their own home on laptops and other mobile devices.

For those businesses that have already rolled out remote working policies or in the process of rolling it out, our IT consultants have put together some key tips to consider.

Key tips to consider regarding your remote working policies

  1. Setup a Management Zone. Restrict access to certain parts of your network and systems by configuring a management zone. This enables key employees to access systems while blocking access from the internet.
  2. Review your VPN. Make sure you are using the most up-to-date versions of your software/firmware, and ensure crypto settings are using 256-bit cyphers and above. Where possible use certificates rather than relying on usernames and passwords, and deploy multi-factor authentication, so that access via the VPN has an extra layer of security.
  3. Use Multi-Factor Authentication. Eliminate brute-force and credential stuffing attacks using an extra layer of protection to gain access to your systems.
  4. Use only approved devices. Ensure your employees only use company-approved devices to access your systems and data and that they are secure and up to date with the latest software versions.
  5. Train your employees. Mitigate the risk of human error by training your employees on how to spot a phishing attack, what to do if they suspect a phishing attack and how to report it to their IT team/department.

How we can help

At MMRIT, we work with businesses across the financial, legal and professional services sectors. To discuss your cyber security provisioning and how to roll out your remote working policies safely, contact us. Our IT consultants can give you advice and even manage it for you.

Spread the word

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp
Share on email