BUSINESS CHALLENGE - WORKING FROM HOME

The 3 main challenges with working from home are:

  1. How do we communicate with our customers and colleagues?
  2. How do we protect our business computers when they are at home?
  3. How do we connect to our work systems?

HOW DO WE COMMUNICATE WITH OUR CUSTOMERS AND COLLEAGUES?

Microsoft Teams
For businesses already using Office 365, Microsoft Teams was available to them instantly for internal communications including voice, video, chat and collaboration / file sharing
For businesses not using office 365, Teams is available free of charge too with some of the features turned off
Many businesses also migrated their existing telephone system to Microsoft Teams too, meaning that they can answer incoming telephone calls from their customers
Teams have mobile versions for iPhone and Android so many people installed this meaning they are in constant communication wherever they are

Zoom
Zoom took off like a rocket and exploded onto the scene, being easier to setup yourself without the need of your IT team it was the choice for millennials and people familiar with mobile apps
Zoom has professional versions and is now being expanded to handled Telephone calls

Phone Systems
The simplest way of picking up your calls was to forward them to mobiles, but many telephone systems already use digital communications so add -on and mobile app licenses may be available for you to extend your office telephone system to your mobile handsets
More sophisticated telephone systems already had mobile apps included so some businesses were mobile immediately
For those that wanted a more seamless cloud based system migration from their current telephone system to Microsoft Teams or another cloud based supplier was planned
Today still, many customers are on traditional phone systems on-premise or via a SIP trunk and are working from mobiles rather than work phones

Email
Most businesses are already on an email system that enables mobile email or webmail, whether they are on Office 365, G Suite or Microsoft Exchange (on-premise)

Bring Your Own Device (BYOD)
Where your staff are using their own equipment at home you need to be even more careful, as your business protection for antivirus and cyber security is not deployed to this device and viruses, malware or key loggers could be active. Therefore connecting this device to your network via a VPN is not recommend as any malware could propagate onto your business network. Also when your users key in their passwords to your systems they could be recorded enabling cyber attackers to connect to your network and look for ways to extort you

HOW DO WE PROTECT OUR BUSINESS COMPUTERS WHEN THEY ARE AT HOME?

  1. Antivirus
    1. Ensure a next-generation Antivirus product is installed
  2. Firewall
    1. Ensure the firewall is active from Windows or the antivirus
  3. Emails
    1. Ensure that any emails are being scanned for viruses, malware and phishing
      This is carried out at a service level and nothing for your users to do
  4. WIFI Network
    1. Ensure your users Wi-Fi network is secure at least from the average hacker by ensure WPA2 passwords are required
    2. Avoid using public/shared wireless networks when outside the office
  5. VLAN Separation
    1. Where the home user is a c-level or a high risk user consider using a VLAN to separate the Home network to the business network
      This will prevent other family member computers / games consoles / IOT devices if compromised attempting to breach your computer
  6. Secure Meetings
    1. Ensure meetings created are not open to anyone , Teams meetings only invite required participants
    2.  Zoom meetings create strong password for meeting to stop zoom-bombing
  7. Security Updates
    1. Patch management should work and be monitored outside the office to keep business devices updated for latest features and security updates

HOW DO WE CONNECT TO OUR WORK SYSTEMS?

  1. VPN
    You should only connect to a VPN from a company device that is protected with Antivirus
    Never connect to a company VPN from a non-business computer
  2. Terminal Services
    Some business systems will only work efficiently from an on-premise / on-network device and may be bandwidth intensive if not built for modern cloud infrastructures therefore you have no option than to connect to a pc / virtual pc on their physical network
    The most common methods are to use Microsoft Terminal Services (Remote Desktop Services) or Citrix
    Microsoft Terminal Services can be configured to work on Microsoft Azure network
  3. SharePoint
    If your business uses SharePoint you should be able to login from your device and access resources
    You can choose so sync file libraries to Microsoft OneDrive to give you offline access to files
  4. OneDrive
    If your business uses Office 365 you may be using OneDrive to store files, OneDrive can also access other file libraries stored on SharePoint
  5. MFA / 2FA
    Multi Factor Authentication / 2 Factor Authentication is a method of using your mobile device to authorise access when you login to a new device
    When connecting to business resources you should always use MFA / 2FA to authorise the access
    MFA on office 365 can be set to trust a device and only request MFA every 60 days, so accessing email or files on office 365 ecosystem only needs to be authorised once every 60 days

ACTION

Wizard Cyber is part of Wizard Group and can help with any of the following:
CYBERSHIELD can help to protect and secure your endpoints, email, phishing, office 365, Teams, SharePoint, OneDrive, MFA and Microsoft Azure
Wizard Group can help with implementation of Microsoft Teams, Teams Phone System, Office 365 Implementation, Terminal Services

RELATED ARTICLES

Contact us for more information or click the link below for overview and pricing

Please fill out the form below or call us directly on +44 (0) 333 311 0121.
Loading