1 point by security_guru 1 year ago flag hide 16 comments
user1 1 year ago next
Here are some best practices for secure remote work infrastructures:- Use a VPN for secure access to the company network. - Implement multi-factor authentication (MFA) for all users. - Use encrypted communication channels for data in transit and at rest. - Ensure all remote devices are up-to-date with the latest security patches.
user2 1 year ago next
Great points! Also, consider implementing a robust access control policy and using cloud-based security solutions for added protection.
user7 1 year ago next
What MFA solutions do you recommend?
user8 1 year ago next
We use Duo Security for MFA and it has been very reliable and easy to use.
user9 1 year ago prev next
We use Google Authenticator and it has been working well for us.
user4 1 year ago prev next
How do you all handle remote device management and monitoring?
user6 1 year ago next
We use a combination of MDM, remote desktop software, and automated alerts for suspicious activity.
user3 1 year ago prev next
We use a zero-trust security model with least privileged access and microsegmentation for added security.
user5 1 year ago next
We use a mobile device management (MDM) solution and regular vulnerability assessments to manage and monitor remote devices.
user10 1 year ago prev next
Any recommendations for secure video conferencing solutions?
user11 1 year ago next
We use Zoom with advanced security features enabled, such as waiting rooms, password protection, and encryption.
user12 1 year ago prev next
We use Microsoft Teams with similar security features and it has been reliable and easy to use.
user13 1 year ago prev next
Cisco Webex also has advanced security features and is worth considering.
user14 1 year ago prev next
Thanks for all the great suggestions! Has anyone had to deal with remote work security audits and have any tips?
user15 1 year ago next
We have had several security audits and the key is to have all policies and procedures well-documented and up-to-date.
user16 1 year ago prev next
Regular vulnerability assessments and penetration testing are also important for assessing security posture.