Page 1 of 1

Obviously, the scope of security measures

Posted: Tue Feb 11, 2025 5:52 am
by Rakhiraqsdiwseo
In remote work, the task of backing up system administrators and VIP users has become more urgent, which is due to a sharp increase in risks associated with the inability to perform their work functions - exclusive access to ICT resources, the implementation of VIP powers regarding the preparation of documents, management actions, etc. The business continuity strategy should provide for the possibility of replacing system administrators who have become unavailable or the availability of a way to contact the CEO if his traditional communication channels suddenly stop working, or the ability to obtain the signature of the quarantined chief accountant, who still has a flash drive with electronic signature keys.

for remote access (at the remote access point, on the corporate perimeter, in the cloud) depends on how it is built as a whole.

All the above-mentioned methods of ensuring remote access information security relate to the implementation of the increasingly widespread concept of “zero trust”, which implies the organization of layered checking of connections and the rejection of any trusted connections and users, who may become the first target for intruders.

If a company has the ability to distribute el salvador whatsapp data laptops or powerful enough home computers to employees, then by creating one virtual image with the necessary software, it can be deployed to all remote workstations in a few days.

In general, deploying basic means of ensuring a secure workplace can take a few days in a large company. If we are talking about advanced security technologies, the process can drag on for weeks.

Compliance with information security rules by users in remote working conditions
With the transition to remote work, little has changed in the attitude of employees towards compliance with information security rules - they were rather careless and remained so, continuing to fall for the tricks of intruders using social engineering techniques. In addition, if companies have not implemented tools for monitoring the results of employees' work at home, the productivity of employees is affected by the relaxation caused by the home environment. When Russian companies were just switching to remote work, a large number of questions arose about whether perimeter protection tools (for example, Cisco Firepower), home PC protection tools (for example, AnyConnect or Cisco AMP for Endpoint ), network anomaly analysis tools (Cisco Stealthwatch) can be used not only for their intended purpose, but also to identify "virtual absenteeism". Yes, this can be done, which once again shows that the information security service can solve not only its main tasks, but also related ones, in the interests of other departments.