JP Chua

By: JP Chua on July 1st, 2022

Print/Save as PDF

3 New Rules for Remote Access Security [Video]

Cybersecurity | Video

As more businesses rely on remote access to do work, it’s crucial to follow rules that will ensure your business’ security. In this video, we’ll go over the 3 new rules for remote access security. 

Rules for Remote Access Security

0:00 Introduction 

0:33 Tip #1: Never grant unlimited third-party access to your system.  

Give the least amount of privilege necessary to complete the required business function.  

For remote access, this could mean ensuring that third parties can only access certain datasets or certain areas of a network that they may need to collaborate and work with you. You could also place restrictions on where your business partners are accessing from. 

Another scenario for third-party access is if you are working with a software vendor. Unless you are working with your trusted IT provider, consider being very restrictive with entering passwords or any administrator access needed. Don’t provide this information up front, but instead request clear justification at the time this information may be requested from you. 

2:19 Tip #2: Always check the endpoint security of remote devices.  

Employee’s personal devices used for work should be secured with a password, nobody else should use the personal user account that your employee uses, the operating system firewall should be enabled and all updates should be installed regularly. 

3:10 Tip #3: Get a cybersecurity audit from a leading managed IT services provider.   

Consider reaching out and scheduling a cyber security audit from a leading managed IT services provider such as ourselves. Our experience and expertise provide us with the strategies and tools to address your needs and more. Our free audit process means you can get more information than you have today and the peace of mind knowing that you have IT professionals on your side. 

Schedule your audit today, and let’s get in touch! 

Free Network Assessment