Explore Tech Articles

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

As they say, what gets measured, gets managed. Well at Network Right we believe that what gets documented, gets done. Proper IT documentation is vital to an organization and helping scale efficiently. Documentation helps in numerous ways from prepping new hires to automating certain workflows. That said, here’s a look at what we believe the company’s IT department should have in mind when building out documentation & furthermore what we can help implement across our clientele that in turn helps the organization as a whole.

No items found.

Keep It Simple

In the world of IT when describing or illustrating an issue it’s easy to get too complex or technical. Furthermore assuming a user has previous knowledge of what may be considered basic is never safe to assume. Rather aim to always keep it as simple as possible. Over simplify while avoiding being over-detailed. Whether you’re illustrating how users access something, a common fix to a technical problem, or what have you. Keep it simple in your approach to explaining steps & procedures. There’s time and place for more technical/detailed documentation but as a general rule of thumb simple is safe.

Visual Mediums

Often documentation is made up of text-based content. Write-ups, lists, steps, and so on. However nowadays and especially in the IT field, it’s a visual medium. Taking advantage of screenshots, images, even videos are great ways to make your documentation stand out! It’s easier to highlight in a picture a specific button that a user needs to click versus describing in the text. Furthermore, with markup & annotation tools you can really take your documentation to the next level.

Consider Failsafes & Variables

Great IT documentation always takes into consideration that there are variables in certain scenarios. So we combat this by offering a failsafe method to redirect users to either helpdesk or a method of contact when users get stuck or something occurs that falls outside the instructions.

Examples:

ie) If you have any issues amidst this process feel free to contact helpdesk@networkright.io for further assistance

Take into account in certain situations a fix or problem outlined in a document may not always resolve the issue or unknown variables may come into play. So playing these scenarios out are always a great way to improve documentation. Taking and if this happens, then try this approach. Plotting out as many possible scenarios helps users move along seamlessly.

Document & Automate

If IT issues occur often enough it’s a clear sign to document & automate. We often look at common help desk issues across our clientele & ask ourselves what occurs frequently enough that we don’t have documented.

  • How do I change my laptop password?
  • How do you search on a Mac?
  • My computer is slow what do I do?

These are just a few examples we’ve seen & created documentation around in order to quickly have reference material for employees to access quickly & efficiently. This not only helps employees have better access to potential solutions & troubleshooting steps but it also helps free up technicians’ time. Documentation can serve as the first line of defense when resolving issues before it needs to escalate for further support. Common tasks & issues with set solutions are the perfect ones to document as they never change.

Accessibility

Even more important than the documentation itself is the accessibility of it. Ensuring your team can easily access links or resources in which your documentation lives is key. Consider the platform in which you plan to house your documentation and how you can make access to it as convenient as possible.

  • Consider categories for your documentation (Networking, Access Control, Security, etc)
  • Friendly URL/Link naming schemes
  • Clear titles for documentation

Internal vs External

Remembering that documentation goes both ways on the IT front. Keeping in mind while it’s great to have documents for new employees, common issues, and so on it’s equally as important to have internal documentation for the IT department as a whole. At Network Right we create internal documentation for all our clients so that in the event a technician has to fill in for an account they have complete visibility to how a client’s app-stack & workflows operate.

This allows IT to create a bit more detailed/in-depth documentation to show certain ins & out of a client system. Internal documentation is key to helping scale IT infrastructure & teams. Ensuring your organization has both its internal and external facing is a big step to building out your IT documentation.

Following the tips and policies above will help your organization strengthen your IT team’s documentation and ensure that your employees are set up for success! If your looking to get help with your companies documentation process & overall setup on the IT side don’t hesitate to reach out today at hello@networkright.com

IT Documentation Done Right

View Article

No items found.

Even outside of the remote environment and times we’re in security is always vital to an IT infrastructure in terms of ensuring it’s up to date & maintained appropriately. While we’ve certainly seen a spike in security concerns amidst this whole work-from-home culture we always suggest reviewing your IT’s security policies and looking for ways to improve. Ultimately the goal is to secure your environment from data, employee access, and so on. All while finding a balance of convenience and having your user base understand the importance of said policies.

Here are some of our top recommendations to look to put in place across your organization’s IT stack.

2FA or Multi-Factor Authentication

Enforcing a security measure known as 2FA (2-factor authentication, multi-factor, 2-step verification) does as the name implies. It adds a 2nd hurdle when logging into specific apps under certain circumstances. A common use case would be when an employee signs in to your G-Suite inbox for example from a personal laptop or a location they don’t commonly sign in from (let’s say while on vacation) the app will prompt for a code that’s generated via an app or texted to their cell phones. This randomly generated code serves as a 2nd password of sorts to verify you are who you claim to be.

Many apps nowadays allow for this feature to be enabled and in some cases enforced. Such as:

  • G-Suite/Gmail
  • Okta
  • 1Password
  • Slack
  • Zoom

To name but a few, this tremendously helps with preventing unwarranted access to an account. As if the intruder gets access to your password they’d still need the 2FA method to verify access. Making it one of the most secure methods to help lock down accounts. We suggest setting up some sort of enforcement policy for major apps such as G-Suite in order to get everyone enrolled. Many apps offer multiple ways to store said 2FA keys making it easier than ever for end-users to manage.

Password Policies

You’d be surprised the number of passwords left as something simple for convenience sake, written on post-it notes at a user’s desk, and so on. Given these are the first barrier of entry to accounts & even company hardware it’s important to have security policies in place to protect passwords across the organization.

Here are a few of our tips:

  • Enforce standard password policies/compliance standards (HIPAA, SOC2, etc)
  • Common requirements for apps such as-
  • Enforce Password History policy.
  • Minimum Password Age policy.
  • Maximum Password Age policy.
  • Minimum Password Length policy.
  • Passwords Must Meet Complexity Requirements policy.
  • Reset Password.

Meaning users need to ensure the password they use is up to par or that apps enforce said requirements. Certain character length, complexity (Letters & symbols), and so on.

  • Provide a way to easily manage logins (Shared & Personal)
  • Tools like 1Password, LastPass, DashLane are all ways to provide password management across your organization. Making setting up & remembering secure passwords not just easier but more secure overall. With password manager users simply remember their master password to the app there-in providing access to the majority of the other logins.

Proper Network Configuration + Security Settings

We’ve often seen this with networks that were set up without IT’s involvement where certain settings or configurations just lead to potential risks down the road. Given that your network has the potential to provide access to any on-premise devices (servers, network drives, user devices) it’s important to ensure your team has properly configured your setup to have security in mind.

We suggest checking the following:

  • Ensuring proper wi-fi settings are in place (Password + Setup)
  • Having at least WPA level encryption on your wireless network is important at the bare minimum to ensure you have a password protecting access to the network. At a higher level, there are certainly more secure encryption levels & standards that will be required based on your companies policies
  • Ensuring proper equipment is deployed
  • Outside the pure configuration & settings aspect, it’s important to first be to confirm your team has proper hardware in place. Things like firewalls or enterprise-grade routers all help play a part in protecting your overall network. So ensuring your team has done their due diligence on what hardware they’ll require & will scale with them.
  • Setting up a “Guest Network”
  • Again concerning a network, ensuring that outsiders or visitors to the office don’t simply get access to the same network many other confidential devices may be on is vital. By implementing a guest network you can have external members access said wi-fi for browsing needs and so on while isolating your main network.
  • Virtual Private Network
  • We talk about it a lot here at Network Right & for good reason. VPN or Virtual Private Networks can be vital in certain setups to allow for safe transmission of data & a way for users to connect to resources outside of the corporate network. We often see this setup as a way to provide employees access to company-related data/tools when let’s say working from home as an example. Overall even in a none remote climate, having VPN never hurts! It’s a great way to train yourself to personally tunnel your traffic when using public networks and protect your privacy/data. As the name entails it creates a secured & often encrypted tunnel for you to browse from point A to B.

Device Management System

A big one some companies may not consider especially early on as they build out their fleet of devices (be it mobile or desktops/laptops) is how they manage all of it. What do you do when an employee who has sensitive data on their machine has their device stolen or lost? This is where we recommend a mixture of systems to best prepare & manage these future issues

    MDM or Mobile Device Management

Another big part of what we help set up & manage for our clients is a tool known as an MDM. This allows us to help manage mobile devices be it iPads, Android phones, or even Macs & PC’s. This lets us set up tools to provision them out the box but most importantly do a couple of things from a security standpoint.

  • Allows us in some cases to remote wipe or lock down a device if lost/stolen
  • Allow us to track the location of devices
  • Allow us to push important security updates/patches org-wide in event of major breaches
  • Gives us a running inventory of how many devices we have in the fleet
  • Makes onboarding/offboarding that much more seamless

All in all MDM’s are great tools that serve multiple purposes but one of the biggest hands down is improving security & inventory management needs for companies.

These are but a few of the tips & policies we’ve helped implement in our client’s workflow & stack of tools. However there all vital nonetheless to ensuring your team & their data are safe. Security while sometimes coming at a cost or inconvenience for an end-user is for the greater good. As your company begins to scale, prep for compliance, and so on it should always be something you’re ensuring you update to date & following the best practices.

If there’s anything mentioned in the article your team/company wants help implementing in your environment, don’t hesitate to reach out to hello@networkright.com for more info!

Cybersecurity

Important IT Security Policies to Ensure Your Company Has In Place

View Article

Much like the world at large, the team at Network Right was faced with tackling the transition to a completely remote workforce. Not just for our internal team but our clientele. As an IT provider, we are thankfully in an industry more prepared than most for said environments. Nonetheless, we had to look at the most common issues companies would face in this movement from the IT side & how we can help combat it using the proper tools, policies, and planning at scale.

No items found.

Much like the world at large, the team at Network Right was faced with tackling the transition to a completely remote workforce. Not just for our internal team but our clientele. As an IT provider, we are thankfully in an industry more prepared than most for said environments. Nonetheless, we had to look at the most common issues companies would face in this movement from the IT side & how we can help combat it using the proper tools, policies, and planning at scale.

1. Video Conferencing

Arguable the AV space saw the biggest jump in our remote work transition. Many clients who had conference room solutions while in the office had to prepare their teams for fully communicating via popular apps like Zoom, Microsoft Teams, Google Meet & more.

As such we make sure to work with our current & new clientele to ensure they had the appropriate software & plans in place to best support their workforce. With the increase in virtual events, we worked with department managers, assistants, and office managers alike to ensure the tools they used allowed them to easily host events that fit their criteria. For example, setting up Zoom accounts for companies and ensuring they had features such as breakout rooms, webinars, and licensed accounts for all their teams hosting calls longer than 40 minutes.

Staying in the touch with the team at this time is more important than ever. So we worked with our clientele to be sure their software stack met their needs to keep their employees in touch despite the remote times.

2. Corporate Network to Home Networks

The other major concern for companies was the move from a corporate network to employees being on individual home connections. Security & accessibility is the most important aspect here.

VPN:  Virtual Private Networks was one of the first things we worked with our clients to ensure they had some sort of solution available to help secure their employee’s traffic. VPN allows the user traffic to be tunneled safely when browsing & transferring data over networks especially that of the home where IT doesn’t have any administration. Furthermore, for clients with on-prem hardware (Servers, Data Storage, etc) at offices, we got VPNs configured at the network level to allow employees to connect as if they were at the office. This allows employees to access data and environments that they normally would on the corporate network.

Cost Savings:  Given most offices went on pause we worked with both our clients & ISP partners to see where we could help save on costs. With no internet being used in some spaces where contracts permitted we worked to reduce cost & implement temporary savings.

Remote Monitoring: Having some level of visibility on the corporate network was still important for a lot of our clients. Whether it was on-prem devices or to ensure empty offices were secure we worked with those who didn’t have enterprise-grade equipment to implement hardware that allows our team to monitor any network drops, status, and various other information. Giving clients a sense of safety & visibility despite being out of the office.

3. Remote On/Offboarding

One of the biggest hurdles faced was that of the transition to on/offboarding in these remote times from an IT perspective. We worked closely with HR departments to ensure we could have a plan in place for the remote work situation.

  • Implementing MDM or mobile-device-management tools for clients who didn’t have these in place effectively allowing us to both set up laptops brand new out of the box with zero involvement as well as offboard (remote lock, wipe/erase) machines upon offboarding/terminations
  • Worked with our partners to procure & ship hardware to new-hires be it laptops, monitors, or other accessories to ensure they had their entire IT setup delivered to their home residence.
  • Inventory management. Logging all hardware, asset tagging, and more to keep track of devices given the non-centralized environment. This also allowed us to collect & store equipment from employees who may have left the company. Giving office managers peace of mind knowing IT hardware wasn’t being returned to an empty office.

These are just some of the few ways we adjusted or implemented certain tools into some of our clients to ensure they were prepared & could handle the transition of onsite to remote hiring/offboarding in a way that’s efficient for all parties involved. While keeping IT security & employee satisfaction at the forefront.

4. Phishing Attempts

The post-pandemic world saw a huge spike in phishing attempts across the year. As more and more people began to work from the home, the physical disconnect could at times make these spam/phishing attempts more susceptible to succeeding in their nature. As we saw the increase globally we did our best to ensure our clients were prepared.

  • Hosting seminars & sending reminders became something we did heavily early on for some of our clients to help reinforce what potential threats/attempts look like to more easily spot them. Further what action needs to be taken when encountering said emails or contact. Setting up proper ways to quarantine and alert IT of said attempts.
  • Setting up improved & hardened filters for clients email programs to ensure things like spoofed domains, fake employee names, and so on are easily flagged & warn the user
  • Enabling certain email security protocols such as SPF & DKIM to help ensure our messages that we send outbound doesn’t end up in client customers spam and so on
  • In areas of compliance standards, we even had implemented test programs & tools to help test general security across organizations and how users respond to phishing. Allowing us to provide data to clients such as how many employees clicked on a link in a phishing email, submitted info, etc. All to then know what areas we can improve on & have said users go through training programs to help prevent them from happening in live scenarios down the road

This area was all about communication & being proactive to spot the troubles that would arise globally as a result of the remote workforce. Further how we in IT could help secure our customers & their data as well as educating the employees in such matters.

5.Communication with the IT Team

Lastly and most importantly we wanted to ensure that communication to our internal IT help-desk team was efficient, easy, and humane. We know that being outside the office and no direct communication can often leave problems left unchecked, urgent issues maybe not get flagged, and so on. Helpdesk being one of the leading services we provide, we wanted to be 110% certain in the transition existing clients didn’t lose the on-site white glove experience and that new clients felt our team was apart of there’s despite the remote times.

We achieved this in the following ways:

  • All clients get a dedicated helpdesk@companyname.com setup that triages into our service desk system. Tickets are auto-assigned to the client’s lead technician and available for our account managers & other service desk members to take on as needed. All without interaction from the client-side.
  • Users can contact our IT team via email & popular communication apps such as Slack. We further expand upon this by making it easy to flag a message in slack & auto-sync it to our ticketing system. Ensuring communication on slack conversations gets added to the ticket history.
  • Our service team offers responses in 24-hours supporting companies with multiples offices across timezones & even countries. We ensure a plan is set up so that your team no matter size or location has the resources allocated to support the team in this remote climate.
  • We implement software stacks from mobile device management, remote monitoring tools, and more to help further maintain the service we offer on-site. Allowing us with permission to connect to employee computers & diagnose their issues as we would in an office environment
  • At Network Right while we believe in not having IT be a barrier & fixes to get you on the way. We also believe in educating our clients & their employees. Explaining the root of issues & how to avoid or fix them in the event they ever occur down the road. Educating customers where we can in our field to help provide more context & insight into the matter at hand. Working to support teams of employees no matter their location, setup, and so on.

Communication is key in our field. Just as we offer our on-site service we wanted to ensure our remote presence was also felt if not physically at least digitally. We plan to continue to support all our client’s present & hopefully future ones for as long as these times or hybrid setups exist. While we enjoy the face-to-face connection at client sites we want to be able to safely & efficiently continue to offer our level of services regardless of conditions.

We hope to someday serve you as well! Be sure to reach out to our team if any of the above are issues your team may be facing & want to see how we at Network Right may be able to assist!

Tackling the IT Remote Work Hurdles (Common IT Issues & Solutions)

View Article

No items found.

Mobile Device Management, or MDM, is the term used in reference to managing your fleet of devices corporate-owned devices, from both hardware and software perspectives. An MDM allows your team or IT department to do a multitude of things. As an MDM admin, you have the ability to conduct inventory on all devices, like laptops or mobile devices purchased. You’re also able to push updates remotely, wipe/lock devices in the event they’re stolen, and much more. Whether you’re a school district deploying hundreds of tablets or a workforce with 100+ laptops deployed to employees, an MDM can be the perfect solution for your organization.

The reason that this is important above all is it gives you visibility and management over your companies’ fleet of devices, effortlessly. It ensures all assets are in one place, while also giving you practical control over how you want your IT environment to be set up. MDM helps roll out policies that make companies, and in turn, their employees, more secure and efficient. To better understand why you would want an MDM implemented, we must dive more in-depth as to what they can do. While there are many MDM solutions out there, they all tend to offer these basic arrays of features and capabilities.

What can an MDM do?

    Inventory all asset information, like device serial numbers, models, the user it’s associated with, thus making inventory management much easier. Additionally, this can be set up to occur out of the box. From IT purchasing a laptop to getting delivered to a new hire and greeting the new hire by their name. As crazy as it sounds, it is possible!
    Redefines the onboarding experience with zero-touch deployment. MDM allows you to set up a base configuration on how laptops or mobile devices should be set up out of the box. This includes what apps should be pre-installed, what security features should be turned on or off, restrictions, and much more. This saves your IT/HR team hours.
    Offboarding is equally just as smooth with MDM. Admins can wipe/lock a laptop in the event of a termination or, even more critical, the asset is lost or stolen.
    Enforces IT policies, such as: ensuring user drives are encrypted, and firewalls are on, and password strengths are met. This helps companies meet compliance, like SOC2 or HIPAA, when the policy is set at the device level.
    Push out an important app, app update, or OS updates across a series of machines.
    Allow IT insight into user devices so they can easily troubleshoot or see the current status of a machine within the fleet.
    Generate reports & audits to get a scope of how many devices are on old operating systems, have a certain app installed, etc.

This, among many other things, are just a small part of what MDM’s are capable of. Above all, they help streamline processes, and in turn, save time, money, and hassle across the board from your HR to finance and IT teams.

How does an MDM work?

With how robust and powerful an MDM can be, it’s important to also understand how they work to provide peace of mind to both the users and teams’. While every MDM varies at the technical level, a majority are based on the same foundation. The MDM provider installs an agent and/or a device profile on the device. That agent can be manually installed by your admin, enforced during users’ enrollment, or automated from the purchase point. Once that agent is installed. it adopts a profile set by your admin, which then periodically checks into the MDM software to ensure policies are deployed properly and the profile is up to date. So, for example, if your company decides they need to roll out Zoom company-wide, your MDM admin can simply add that app to the company-wide profile on the MDM and push it out to remotely install as soon as a connection to the internet has been made on each device.

On top of that, it can do this via a secure connection to ensure all data is protected along the way. The device and profile information is then stored on your MDM provider’s servers for you to access and whomever else you grant access to. The users don’t see anyone else’s device or have access to the MDM’s dashboard.

How much does an MDM cost?

Like most software, MDM prices will vary depending on what is needed and features are being requested. Most usually charge you at per device rate either monthly or annually.

At the end of the day, it’s worth asking yourself:

-What features do I need out of an MDM?

-How many devices do we have?

-Will the time saved from an MDM make up for the cost of it in itself?

Does it matter what MDM provider I choose?

Definitely! It’s important to know what platforms they support, what their technical support is like, and if will do all the things you need it to do. All in all, an MDM can be a solution to multiple problems that many organizations face. Problems such as inventory management, security updates, compliance, onboarding, offboarding, and more. With that being said, here’s a preview of some of the top MDM providers Network Right recommends.

Apple Based MDM Providers

  • JAMF PRO
  • Fleetsmith (Owned by Apple)
  • Kandji

Cross-Platform MDM Providers

  • Microsoft InTune
  • IBM Maas360
  • Meraki Systems Manager

If you or your company is interested in implementing an MDM solution, please reach out to us at hello@networkright.io and we’d be happy to help!

What is Mobile Device Management (MDM) & How It Helps Manage Your IT Assets

View Article

No items found.

October marks the start of Cyber Security Awareness month so there’s no better time to revisit some common security tips & practices! At a time where many are in remote or work-from-home environments, it’s important to help protect your workforce, assets, and data.

One of those common attack vectors despite being the most common can be the most effective, phishing. Phishing is the act of pretending or falsifying information in order to get the recipient to reveal sensitive data such as banking, company info, credentials, and so on. While this commonly gets bundled as spam email it’s worth noting that phishing attacks nowadays can be complex & surpass certain spam filters. So here are some tips from the Network Right team to help protect yourself & your employees when it comes to Phishing attacks.

1. Double-check

A very common rule when it comes to email phishing attempts is to do a twice-over of all the details of the emails. Noticeable things such as :

  • The “To Field” ensuring its the actual sender & not a spoofed or misspelled domain name
  • Check for multiple grammar/multiple spelling mistakes. Phishing attacks are typically templated or poorly written to the point where it helps identify that the email isn’t legitimate.
  • Be wary of any email that asks for private/confidential information (Passwords, Mobile numbers, address, and or the request to purchase something on someone’s behalf)
  • Don’t download or look out for random attachments
  • It is common for the spammers in question to spoof names of employees who work at your company often targeting high-level roles such as CEOs and so on to add a sense of urgency in replying to said requests. That said always double-check the information above or if you’re still unsure, directly contact said contact in order to verify.’

2. Domain Spoofing

That said it’s worth being aware that there’s such thing as domain spoofing. This is where the spammer in question can pretend to be a part of your domain user@domain.com. Making it hard to 100% tell if the email is legitimate or not. While IT admins can do things to help prevent these (Such as implementing filters in G-Suite & so on) it’s always a chance for spammers to leverage this. It’s best for the IT department to preemptive about this and ensures most filters or security policies are in place before any phishing attacks. However, for users knowing this is possible in the first place is the most important step so you can be aware of it.

3. Legitimate Emails/Services Spoofing

Often a common attack method is to pretend to be a service or app users may use or be the admin of & attempt to contact users & urge them to change certain credentials or add billing info.

Always be aware of any email in which a company asks you to confirm billing info such as credit cards, reset your password when you didn’t manually request it, and so on. While there are legitimate ways to get these emails it’s always a safe bet if your unsure to go to the site directly & change such info versus clicking a link in an email especially when it’s unwarranted or disguised in an email telling you that its urgent to do so.

4. Be diligent where you sign-up with your email

While spammers get email addresses from a variety of methods it never hurts to be cautious of whom & what services you give your email to. Often times we’ve seen even legitimate companies have info leaked where users’ emails get out to the public & thus added to these lists that end up spamming users. So while it’s at times unavoidable always do your best to be aware of what services you sign up for.

5. Protect yourself!

In the event, you or your employee fall victim to a phishing attack these are some ways you can better prepare & react to when it occurs.

  • Change credentials immediately (If you accidentally send any info, do your best to go through the official site to change said credentials & or report in the event you leak payment info.)
  • Setup 2FA/Multi-Factor Authentication this is a great way to help stop access to services such as email. Two-Factor forces a second verification method such as texting a code to your mobile phone so that in the event someone got your email login they couldn’t get in without having that 2nd factor. Look at how to set up 2FA on common services such as:
  • G-Suite- https://support.google.com/accounts/answer/185839
  • Office 365- https://support.microsoft.com/en-us/office/set-up-your-microsoft-365-sign-in-for-multi-factor-authentication-ace1d096-61e5-449b-a875-58eb3d74de14
  • Report Phishing attacks that do get through. Most email programs in themselves have decent built-in filters however things still get by. By reporting emails as spam/phishing it helps improve the algorithm to better detect said attacks
  • Again on the IT admin end many of these tricks such as domain spoofing, pretending to be a user within the company, and so on can be filtered/blocked before it even hits the user’s inbox. Be sure to contact us at Network Right if Phishing attacks are becoming too commonplace or targeted for your domain to see how we can help better protect & prevent said attacks. Now that users are at home and on non-corporate networks, these attacks can surface more commonly. So doing your best to ensure from a tech perspective your company and its tools are prepared as well as from a user-level you do your best to educate your employees of common practices & good digital hygiene to prevent these from occurring in the first place. Stay safe out there in the digital space!

Tips to Identifying Phishing Attacks & Avoiding Them

View Article

Given the climate we’ve been in for the majority of 2020 security is more important than ever when it comes to Infosec/IT. Seeing as employees may be working from home or outside networks is more important than ever to practice implement certain measures to help secure your employees & your company data. Here are some ways we at Network Right recommend & help implement across our clientele in these remote times.

No items found.

VPN (Virtual Private Networking)-

One of the most common ways of protecting your employees at home is to implement some sort of VPN. A VPN helps encrypt your employee’s data across the internet & secure all information that’s transferred. This setup can be as simple as looking to integrate a solution such as OpenVPN or NordVPN for your team to help encrypt their traffic or going as far as implementing a full hardware/onsite equipment at the network level to have your employees connect just as if they were at the office. Enforcing certain rules such as only being able to access certain company resources or files while on said VPN.

A VPN is useful across many spectrums, it encrypts traffic end to end ensuring all work they do is secured whether they’re on public or home wi-fi. Given the amount of data we’re sending nowadays as well as the increased work from home, the internet as a resource is one that’s become very essential. How your employees connect & send data over the said connection is equally as important & why you may want to consider some level of VPN setup.

Mobile Device Management-

Commonly referred to as an MDM this tool comes in handy in a multitude of ways when it comes to protecting your employees. Not only does it let you track assets & push out updates/apps but it also lets you remote wipe computers in the event they’re lost or stolen.

This is important because given the remote climate laptops may be more vulnerable to accidental damage or even theft. Ensuring your team has an MDM in place allows IT to remotely wipe the machine or even go as far as to track it. Popular MDM’s like JAMF for Mac or InTune for Windows allows all sorts of controls over your companies fleet of machines & is an investment worthwhile from productivity to security in this remote climate.

2FA-

A security measure we commonly put in place for our clients is 2FA or some level of multi-factor authentication. This feature ensures that there are at least two methods of verification when logging into an account. So for example outside of entering your companies email password, you would be prompted for a code that’s texted to your phone. This creates a second step to login into the account, so in the event, someone compromised your password to a critical login there’s a backup. 2FA is flexible & can be triggered for example only when you log into an account for the first time on a new device or a different location.

Physical/Hardware Protection-

While it may not be as common in a work from home setting you can invest in physical security procedures to help your remote workforce stay safe & protect their hardware. While some of these implementations may be over the top for certain setups we understand that different companies have certain data protection policies in place & protecting that asset is a top priority. So here are some methods to do just that.

  • Laptop cases
    Physical protection is often overlooked however with the remote climate & work from home, accidents can be more common. So investing in some cases for your employees to physically protect their machine from drops, spills, and so on goes a long way.
  • Physical multi-factor authentication
    Some of our clients require further data protection policies & sometimes physical factor devices are what is required for certain setups. Products like the “YubiKey” are great for ensuring users are who they say they are & in the event, someone gains even physical access to the laptop that a second physical key is required to gain access.

Thus why now more than ever as employees are a mix of work or personal machines, accessing accounts on home networks, and from a nontypical location, 2FA is vital to securing account access. Ensuring outside parties can’t get in even with access to a user’s password or account off the bat.

Phishing/Spam Education & Protection-

With the remote workforce at an all-time unfortunately so are scams. Nefarious parties trying to get people to log in to fake portals, compromise sensitive data, or just outright gain access to company hardware all amidst these work from home times. This is why it’s important for you to keep your employees up to date & remind them of proper phishing/spam hygiene. Sending out information & resources to ensure they avoid said scams they may get via e-mails and what not while working from home.

Tips such as:

  • Verify email source (Double checking the “From” field)
  • Be wary of emails asking for any sensitive info or logins (Especially unwarranted password resets)
  • IT teams can ensure proper spam filtering & phishing rules are in place to prevent domain spoofing, email address look-alikes, and so on (We at Network Right specialize in this across platforms such as G-Suite & O365!)
  • Asking users to report said spam/phishing attempts to help improve email algorithms & flag domains/senders to block & so on

As time goes on in this work from the home state, there will always unfortunately be those trying to exploit said times. So doing your best to keep your team informed & aware is a key step!

Anti-Virus/Endpoint Protection

On that same token ensuring not just the physical but digital aspect of your employee’s machines is protected is vital. While we may not always be able to control the environment in which an employee connects to a secured network or user behavior we can help prevent attacks through Anti-Virus or Endpoint management deployment. Deploying anti-virus/malware software like Sophos, Malware Bytes, and many others allow us to remotely scan assets & ensure no nefarious programs or software has infected the systems. It also helps prevent users from accidentally getting exposed to scams or malicious downloads. Remote or not it’s a good practice to deploy some form of endpoint protection to your fleet & there’s no better time than now to ensure company data is protected at the digital level.

At the end of the day, everyone has different living situations. That said though the climate we’re in may not be optimal, it doesn’t mean there aren’t things we can do to help protect our employees & the companies data. Whether it be a home network or users on personal devices there are always ways to help secure & make it a safer & seamless experience for your workforce in these already difficult times. These are just some of the many steps you can take to further protect your remote workforce. At Network Right we help ensure our clients & their team are secure & safe amidst this work-from-home period. As in keeping them safe, we help protect the company’s valuable assets & allow them to continue their work efficiently.

Reach out today if you are interested in implementing any or all of the above at your company today to help everyone be more safe & secure in these already difficult work-from-home times.

Cybersecurity

How To Help Keep Your Employees Secure While Working From Home

View Article