Must have #1 – Secure Connectivity
- Don’t have people just unplugging their workstations and if it is going to work. Make sure everyone is connecting securely.
- There are security risks and things to consider when going to an all remote workforce
- Make sure that you have the right licensing and that you are connecting securely to the network
- Make sure you have the right set up
- Use your protection and still have that human firewall set up so you “yourself” can keep your companies information protected.
Must have #2 – “Backward Cloud Resiliency”
- When we think about the cloud, we think about infrastructure that someone else owns that sits out in the data center, that we pay a monthly fee for.
- This cloud strategy is a way to not pay for the expensive hardware or maintenance that goes into it.
- When we mobilize our workforce, we back into a cloud situation.
- The risk is single points of failure. (a failing piece of equipment)
Must have #3 – A Cloud Strategy
- Its important to have a strategy how to move things to the cloud and how important and critical they are to help your company operate.
- A hybrid cloud is referring to where only a portion of your business is operating from the cloud.
- At Entech, our business is almost a 100% cloud based, everything that we need to do from an operational standpoint is accessible to the cloud.
- This is something that is available to every business, if you have a strategy on how to get there.
- The cloud is up and coming, its only going to be a matter of time before business move directly to the cloud. First there is great financial incentive for them from a recurring revenue perspective rather than making a lump some purchase. Most importantly the reason why people move to cloud is to be secure.
Must have #4 – Managing Mobility
- There is a technological and a policy side to managing mobility, what risk are you willing to take as a business owner?
- As our workforce becomes more mobile, there is going to be risk of data leaking to mobile devices and other technologies.
- Make sure the devices that are connecting into your network are secure and don’t infect your data.
- As users are working, make sure employees are not keeping data on machines that are not being managed.
- This is another challenge, access to information is important. 2 factor authentication helps keep your network and business secure.
Must have #5 – Data Leakage Blockades
- Most people focus on someone getting into your network or the leakage happening from outside of your network.
- Data leakage is where data is leaking on unsecured devices.
- Being able to detect it is something that can be fixed and detected easily if using the right tools.
Tags:
IT Consulting