3 Ways to Help Your Client’s Secure Remote Employees

Table of Contents

In a world of increasingly sophisticated hackers and adversaries, keeping sensitive information safe is a growing challenge for both employers and employees.

The recent rise in remote working due to COVID-19 provides even more for IT and security experts to worry about.

This is where your MSP comes in. 

While there are many benefits to remote teams there is one pressing concern in terms of security: how can we protect those working remotely who may be deemed easy targets operating outside of the robust security systems typical in brick-and-mortar offices.

1. Secure Applications for the Remote Workforce

IT infrastructure alone will not ensure that your client’s systems, software, and security are properly configured and operating well. When incorporating the technology needed for remote work into your infrastructure, we recommend taking the following measures:

  1. Encrypt and install firewalls on all devices. Ask your client’s users to immediately install security patches and update endpoint protection and security (EPS) software on all endpoints, without exception. Taking this precaution can prevent hackers from accessing IDs and passwords and using computers as points of entry to the company’s servers and systems.
  2. Encrypt your client’s computer hard drives, external hard drives, and USB devices. Make sure that all computer hard drives, external hard drives, and USB (thumb) drives are encrypted and company issued to protect worker endpoints from theft or unwanted physical access.
  3. Secure access to company systems. Your client’s security operations center should monitor all VPN and remote-access logs for anomalous behavior.
  4. Make sure cyber-incident response processes are robust. IT teams should update and test all processes and procedures centered around cybersecurity breaches.

2. Provide Guidelines to Employees

The speed and scale of the transition to remote working as a result of the coronavirus pandemic creates numerous security risks for your client’s organization, and your help desk will be the first line of defense.

With this in mind, your organization needs to provide clear guidelines and explicitly define secure procedures for dealing with remote working. Distribute a remote-work policy that specifies acceptable methods for connecting to the internal network.

We also recommend defining close of business, end of the day, and other times after which sensitive data can no longer be accessed—just as if workers were leaving the office to go home.

Though there may be a hiring freeze, you should consider enhancing your help desk. Supporting the rapid surge in remote workers with additional secure tech support could be a wise decision.

3. Update Access and Security Measures

Executives and other senior team members who handle sensitive data are particularly critical but can be less familiar savvy when it comes to cybersecurity risks. Cybersecurity and identity management teams should limit their access and provide upgraded security measures to reduce the risk of compromise.

For example, finance personnel should be on the lookout for phishing, phone, and business email scams, especially those claiming ties to health care organizations or charities. They should verify all financial communications and require verbal approval from executives for all financial transfers.

Remote Security Takeaways

Remote work is now the default for organizations worldwide. This sudden shift has exposed certain vulnerabilities and left many working without the full protection of on-site IT security. And, human nature being what it is, we can’t expect remote workers to consider all of the risks posed by this new security environment.

As such, it’s critically important that your MSP should proactively defend against the types of attacks your clients are most likely to encounter. It’s also just as essential that your customers emphasize endpoint protection and deploy the tools they need to get security right, even as their staff work from their pajamas.

Want to learn more, please check out our SaaS Security eBooks.

Author
Gavin Garbutt
Co-Founder & Chairman of Augmentt

FAQ

Using our GDAP tool & Magic Link, setting up is easy! You can integrate with your CSP partner portal in minutes
Augmentt uses a combination of Microsoft Secure Score best practices as well as industry standards such as NIST & CIS. You can use the out of box templates to get started right away and even build your own custom templates to match your client requirements.
Out of box, Augmentt comes pre-configured to not be noisy. Very few Microsoft alerts are critical in nature so you will be receiving tickets for account breaches and not minor user log related events. That said, everything is customizable and you can turn alerts on & off to match your clients’ needs.
No. You can choose to schedule alerts to any stakeholder you want and at the frequency you want or manually download reports when you need them.
Regardless of how MFA is managed across your tenants, we have you covered. Augmentt supports Conditional Access Policies, Security Defaults, Entra ID per user (Legacy) MFA as well as 3rd party MFA services like DUO.
No. You can use Augmentt to monitor and manage all clients regardless of their licensing. For environments with no premium licensing you can still provide alerts and monitoring for account breaches and configure security best practices. For environments with premium licensing, you can leverage Microsoft’s premium alerts and premium security configurations such as Conditional Access Policies.
Augmentt is one of the few vendors SOC 2 Type II, and GDPR compliant.
Site licenses to make sure you can deliver standardized service across all clients very affordably.

SUBSCRIBE for more resources

Related Content

Policy Sprawl Is Killing MSP Efficiency
Policy sprawl is quietly draining your margins, creating security gaps, and eroding client trust. The good news? Standardization is the cure.
Does Microsoft Secure Score Tell the Whole Story?
Do you have a complete understanding of your security? See why MSPs need to understand the role licensing plays in Secure Score results.
Top 10 M365 Security Best Practices for MSPs
Here are the top M365 security best practices to help you enhance protection, ensure compliance, and stay ahead of emerging threats.