• Increase the security of computers in remote workstations, for which you should

Description of your first forum.
Post Reply
rakhirhif8963
Posts: 730
Joined: Mon Dec 23, 2024 3:13 am

• Increase the security of computers in remote workstations, for which you should

Post by rakhirhif8963 »

“Remote work is contraindicated in closed isolated network segments (technological industrial networks, energy, etc.), as well as in segments processing and storing data classified as state secrets,” says Sergei Krivoshein.

"With the correct use of modern information security tools," Mikhail Kader agrees with his colleagues, "there are no contraindications to organizing remote work for users in any segment. The exception may be technological networks and other closed IT resources to which there is no direct access via the Internet, even via VPN."

How to overcome contraindications to remote work
Alexey Badanov, Head of Strategic IT Consulting Department, INLINE GROUP
Alexey Badanov, Head of Strategic IT Consulting Department, INLINE GROUP
The organization of remote work, especially if it is of a mass nature, leads to a change in the boundaries of the company's “traditional” security perimeter due to the increase in the number of potential vulnerabilities.

The large-scale use of insufficiently protected, or even completely unprotected, home computers, other information processing devices, public networks, and wireless access points makes remote work contraindicated.

To neutralize such contraindications, the following measures can be recommended.

• Strengthen the security of remote workstation connections by using VPN technology and strong authentication for access to information systems and IT services.


- install personal firewalls, blocking all incoming/outgoing connections except those necessary for work;

— eliminate the possibility of working on behalf of a privileged user;

- install antivirus software, thus avoiding czech republic whatsapp data possibility of shutdown;

— update the installation of security updates on all devices of remote employees - workstations, smartphones, routers;

— perform backup copies of information on remote devices.

Such a problem does not arise if the company's information security (IS) system is built correctly, in accordance with IS standards, since in this case the protection of both work computers and connections will be properly organized in accordance with IS policies. And even more so, everything becomes problem-free if remote workstations are equipped with regular work computers of users and are accompanied by instructions on activating individual means of protecting computers and setting up secure connections.
Post Reply