Understand the threats
Devise a remote access security policy
Choose a VPN
1. Remote Access Server (RAS)
2. Secure Sockets Layer (SSL)
SSL connections operate at the application layer, and the VPN gateways are behind perimeter firewalls, with access that can be applied to specific applications. This means remote employees are only able to gain access to applications that they need to use for their work, rather than access to the entire network. For many organisations this is an extra advantage of SSL VPNs, as it offers a chance to control access and reduce the potential risks.
3. Internet Protocol Security (IPSec)
The VPN gateway is at the network perimeter where the firewall is also positioned. The remote user has access to the whole network, but client software must be installed. Employees will only be able to use one authorized device, and security will need to be enforced with clear endpoint security policies.
Enforce multi-factor authentication (MFA)
Remote access to a network should make multi-factor authentication mandatory or at least two-factor authentication. MFA solutions require users to prove additional security measures every time they log in. This could include fingerprint or iris biometrics, RFID cards, or smart cards.
Audit your third-party vendors
The access that is given to contractors must be carefully reviewed and monitored, regardless of how much trust there is in the relationship. The security standards of vendors must be assessed on a continual basis, they should be granted no more access than is essential to their tasks and they must always meet your own security standards.
Use the principle of least privilege
For this implementation of PoLP, a hierarchy of privileges is used, from the least to most privileged. The principle results in an improved level of IT security, as well as better system stability. It is also relatively easy to deploy across an IT environment.
In these difficult times, providing remote access is absolutely essential for businesses that are trying to keep things running while many parts of the world have locked down. There are already numerous challenges that we must all contend with, but we cannot allow ourselves to overlook the importance of cybersecurity. Just one damaging cyberattack could be enough to close a business for good.
About the Author :
About Zak Gottlieb
Zak Gottlieb is the Business Development Manager for Computers In The City, a London-based IT support organization focusing on small and medium-sized businesses. Zak is distinguished by his passion for business, his focus on collaborative team-building, and his commitment to excellence.
See Author’s Website