How to Prepare Your Systems for Continued Remote Work

| August 25, 2020

The work-world is going hybrid. When self-distancing, many employees moved to working from home with the intent of returning. However, recent surveys by Global Workplace Analytics indicate that a fourth to a third of remote employees will choose to remain working from home after the pandemic. Meanwhile, many businesses are reporting significant savings from not housing employees. 

This means that IT needs to remain focused on both in-house and remote-access systems and security measures. The following list can help make sure your systems and processes are ready: 

Update Enforceable Company Security Policies 

Employees need to follow your company’s security policies. These policies need to be updated for the home and be enforced. Some policies include: 

  • Password Management – These should state the frequency passwords are required to be changed. How to create strong passwords. Where and how to change passwords. Not use the same passwords for personal versus office use. Which password management apps and systems to encrypt and safely track passwords are approved. EVERY device needs to be password-protected 
  • Home WiFi security – Every home network router needs to be secured with a passcode or security key and the firewall enabled. Employees must also install another firewall for additional security. Ideally, the WiFi connection should be split between work and home. 
  • GPS Tracking Software – This can locate smartphones or other devices. In particular, devices should contain the ability to be wiped should it become lost or stolen. The use of third-party GPS tracking software for tracking employees’ locations via their devices can help management and HR stay on top of performance levels and expectations. 
  • Maintaining Updates – While expert IT professionals are responsible for keeping the cloud updated, employees must keep their devices and security software updated, as well. 
  • Extended BYOD Rules – Whether your company allowed BYOD rules before, they definitely need these policies now and they need to be adapted for current usage and expectations since the pandemic began. 

Extend your Cloud-Based Systems  Although you have a virtual private network, and probably have moved most of your applications, and storage to the cloud, continue the process. Particularly, moving to hosted data centers whose structure supports and provides perpetual monitoring of the systems. 

Implement and Adapt Multi-Factor Authentication – It provides an extra layer of security to control access. Specifically, this type of login controls those areas that you grant employees to access. Employees should access only to the information or system that they need and nothing else, with no special exceptions due to level or position. This policing will protect your systems from external as well as internal threats. 

Implement 24/7/365 Monitoring 

Contract with a managed IT services provider to continuously monitor your servers and systems for cybersecurity measures and malicious cyberattacks of every type. Monitoring services should also include advanced detection, support, and published backup and recovery plans. Services should also include warnings and notifications of scams, phishing attacks, and other email-related threats. 

At Concensus, we are here to help you stay safe and maintain business continuity.

blog CTA image

Tech Solutions For a New Normal

Whether you need to continue remote work, ensure business continuity, improve security, or address IT expenditures, the IT experts at Concensus Technologies are here to support you and your business with affordable and customizable services and solutions.

Learn More

Let Us Guide You in the Right Direction

  • This field is for validation purposes and should be left unchanged.