Find relative content about managed IT services, cyberdefense and IT strategy here.
When it comes to creating a mobile workforce, we at CalTech have developed a list of recommended configurations to help businesses remain secure while their employees are working remotely.
Write a Policy for Remote Access:
Document:
Managed Laptops/Devices:
Require Multi-Factor Authentication for Any Type of Remote Access:
Secure VPN Access:
Secure Your Data:
Enforce Screensaver/Lockout Policies:
Increase Reporting Reviews:
Increase Cybersecurity Training:
Modify your phishing testing:
Plan to re-evaluate:
Another item to consider adding to your plan is to have a cleaning crew in place to disinfect daily or for the possibility of a positive test at your organization.
Lastly, ensure that you are communicating effectively with your customers throughout this event regarding how you plan to meet their needs.
Please share this with any businesses that could benefit from this information and are currently employing a remote workforce.
Going into a job interview is a huge unknown, to begin with, but it can be even scarier if you have no idea what kind of questions you'll be asked...
The newest Coronavirus-themed phishing attack may be the most ruthless yet. Cybercriminals are sending emails that appear to be from a hospital and...
Walking into a job interview, pretty much every candidate knows the interviewer will ask them questions. That’s the whole point, right? But it’s just...
Sign Up to get the latest News