• Flagler Technologies

Flagler Fix: Approaching Remote Work Security

Recently, 3x-certified engineer Tim Betz sat down in another installment of Flager Fix to Recently, 3x-certified engineer Tim Betz sat down in another installment of Flager Fix to discuss the security approaches that organizations can take while working on-premise and remotely.

Building a Strong Foundation

Recently, due to COVID-19, companies have moved to remote work. This adjustment impacted all businesses and required updated security protocols. Now that businesses are opening up again, many will be revaluating their overall security workflows.

According to Tim, network security should be treated like physical security for a building. When dealing with home protection, if there is a deadbolt on the door, an intruder will just look for another entry point. Similarly, network security must have layers of protection. A castle, for example, has a number of features that protect it from harm – a moat with alligators, a drawbridge and guards.

Applying Strong Security Layers

Much like protecting a castle, companies should build a security policy that is layered and protected against various points and methods of intrusion. When taking this layered approach on a technical level, it is necessary to begin with end users’ laptops. Security programs like anti-virus software are critical to push your network policy to the edge. Cisco Umbrella does a great job of protecting users from visiting known malware sites and URL filtering.

Another added layer of protection for end-user devices is utilizing two-factor authentication. Often times, the second authentication is presented in the form of a text or an email. This can sometimes be annoying to users. Fortunately, however, adding two-factor authentication to your security protocol doesn't have to be disruptive. Cisco's Duo protects your applications by providing a simple, streamlined login experience for every user and application by integrating with your existing technology. Duo offers several authentication methods; users can choose the one that best fits their workflow.

Addressing the Culture of Security

Unfortunately, many companies do not have the appropriate security protocols in place to protect their data. Tim believes that this is because security solutions are oftentimes viewed at burdens; many organizations feel as though it is something that they’re being pressured into purchasing.

However, the reality is that companies who do not enact the proper security measures significantly increase their risk of being hacked. The costs of poor cybersecurity are detrimental, and a successful cyberattack can cost a company millions of dollars, many times ending in bankruptcy.

Every hack is different, based on the skillset or intentions of the hacker. It is crucial to invest in all levels of security infrastructure for your company. Security software is a necessary investment for businesses of any size to prevent hacks.

Do you have any questions? Let us know what you want to hear about next!