What’s Your Remote Access Readiness Plan?

The ability to carry on business during a crisis will underscore the organizations preparedness. If forced to close its doors, your organization must ensure staff can reliably – and securely -- work from home while avoiding an onslaught of calls to the IT department for setup, issue resolutions or general help on navigation to their critical files.

It’s reasonable that most organizations employ some type of remote access, but these solutions are most likely tested under limited volume and circumstances. Preparing for the majority of employees to work remotely – all at the same time – requires planning, testing and possibly infrastructure improvements.

Here are some tips to keep your organization safe, users effective and your IT department out of fire-fighting mode.

Examine Last Login Reports. Depending on the remote access solution you use, reports are generally available to determine when a user last logged in from a remote location. Understanding who recently and successfully recently logged in will save you time and let you gauge the capacity of your solution.

Enable Two-Factor Authentication (2FA). Also called multiple-factor or multiple-step verification, it’s an authentication mechanism to double check that your identity is legitimate. It requires two verification factors, a password and a second factor, usually an authenticator code on a mobile device to login. This ensures that a hacker cannot gain access to your account with only a password.

Update Software to make sure every device connecting to the network has the latest security patches. Software companies continuously monitor the environment to catch hackers before they catch you.

Firewalls. Verify your firewall is setup properly and tested. Our experts can help you verify this in minutes.

Set Policies That Support Safety.

  • Set a policy that automatically locks the computer after a few minutes of inactivity. This helps prevent someone from jumping on an employees computer after they walk away.

  • Set a policy that turns off the screens when someone is working remotely.

  • Set a policy that locks-out an account after a certain amount of incorrect password attempts.

Enable Network Level Authentication. Most servers include Network Level Authentication (NLA) by default. It is best to leave this in place as NLA provides an extra level of authentication before a connection is established. Make sure this is up and running. Our experts can help you verify this in minutes.

Enforce Strong Passwords / Pass phrases on all users, especially those with remote access capability. Password best practices.

Contact us to learn more about how to prepare your organization for safe, efficient and scalable remote access capabilities.

11 views0 comments

Recent Posts

See All