If the organization does not have the opportunity to distribute laptops with pre-installed corporate software, antiviruses and security policies to all users, and users will log into the corporate network using home PCs, you should not neglect "sandboxes" in which files copied by users to the corporate environment will be "wrapped," recommends Danila Egorov. "You should also not forget about SIEM systems for analyzing logs, atypical user behavior and identifying deviations in software behavior. create a plan for training users in the basics of secure remote work and, perhaps, conduct an exam on understanding of the course completed, because secure remote work is not only software or hardware with which we try to close possible holes, but also appropriately trained users.”
"Today, the most specific means of protecting remote workstations," says Anton Lensky, "is cryptographic protection, which ensures the construction of an encrypted (mandatory in accordance with the requirements of Russian legislation) tunnel from a remote computer to centralized services. Domestic cryptographic protection means that meet the czech republic whatsapp data of Russian regulators were specially developed to ensure the confidentiality, integrity, and availability of restricted information during its processing, storage, and transmission outside the controlled zone."
Contraindicated remote work
For most companies, there are no contraindications for switching to remote work, Vyacheslav Logushev believes. It is only important to implement information security policies into business practice, strictly follow them, they should not be formal, paper, but really operational with strict control over compliance.
However, it should be taken into account that there may be processes in business that are not subject to digitalization at all, such as offline customer service. An insufficient level of corporate digital culture may also become an obstacle to the transition to remote mode.
Andrey Zerenkov reminds us of the existence of regulated classes of data and information systems, the operating modes of which must be ensured in accordance with Russian legislation, the requirements and recommendations of the FSB, FSTEC and industry regulators.
It would not be a bad idea to
-
- Posts: 535
- Joined: Mon Dec 23, 2024 3:13 am