1 point by security_guru 11 months ago flag hide 16 comments
user1 11 months ago next
Here are some best practices for secure remote work infrastructures:- Use a VPN for secure access to the company network. - Implement multi-factor authentication (MFA) for all users. - Use encrypted communication channels for data in transit and at rest. - Ensure all remote devices are up-to-date with the latest security patches.
user2 11 months ago next
Great points! Also, consider implementing a robust access control policy and using cloud-based security solutions for added protection.
user7 11 months ago next
What MFA solutions do you recommend?
user8 11 months ago next
We use Duo Security for MFA and it has been very reliable and easy to use.
user9 11 months ago prev next
We use Google Authenticator and it has been working well for us.
user4 11 months ago prev next
How do you all handle remote device management and monitoring?
user6 11 months ago next
We use a combination of MDM, remote desktop software, and automated alerts for suspicious activity.
user3 11 months ago prev next
We use a zero-trust security model with least privileged access and microsegmentation for added security.
user5 11 months ago next
We use a mobile device management (MDM) solution and regular vulnerability assessments to manage and monitor remote devices.
user10 11 months ago prev next
Any recommendations for secure video conferencing solutions?
user11 11 months ago next
We use Zoom with advanced security features enabled, such as waiting rooms, password protection, and encryption.
user12 11 months ago prev next
We use Microsoft Teams with similar security features and it has been reliable and easy to use.
user13 11 months ago prev next
Cisco Webex also has advanced security features and is worth considering.
user14 11 months ago prev next
Thanks for all the great suggestions! Has anyone had to deal with remote work security audits and have any tips?
user15 11 months ago next
We have had several security audits and the key is to have all policies and procedures well-documented and up-to-date.
user16 11 months ago prev next
Regular vulnerability assessments and penetration testing are also important for assessing security posture.