However, it should be taken into account that there may be processes in business that are not subject to digitalization at all, such as offline customer service. An insufficient level of corporate digital culture may also become an obstacle to the transition to remote mode.
Andrey Zerenkov reminds us of the existence of regulated classes of data and information systems, the operating modes of which must be ensured in accordance with Russian legislation, the requirements and recommendations of the FSB, FSTEC and industry regulators.
“Remote work is contraindicated in closed isolated network segments (technological industrial networks, energy, etc.), as well as in segments processing and storing data classified as state secrets,” says Sergei Krivoshein.
"With the correct use of modern information security tools," Mikhail Kader agrees with his colleagues, "there are no contraindications to organizing remote work for users in any segment. The exception may be technological networks and other closed IT resources to which there is no direct access via the Internet, even via VPN."
How to overcome contraindications to remote work
Alexey Badanov, Head of Strategic IT Consulting Department, INLINE GROUP
Alexey Badanov, Head of Strategic IT Consulting Department, INLINE GROUP
The organization of remote work, especially if it is of a mass nature, leads to a change in the boundaries of the company's “traditional” security perimeter due to the increase in the number of potential vulnerabilities.
The large-scale use of insufficiently protected, or even completely unprotected, home computers, other information processing devices, public networks, and wireless access points makes remote work contraindicated.
, the following measures can be recommended.
• Strengthen the security of remote workstation connections by using VPN technology and strong authentication for access to information systems and IT services.
• Increase the security of computers in remote workstations, for which you should:
- install personal firewalls, blocking all incoming/outgoing connections except those necessary for work;
— eliminate the possibility of working on behalf of a bahrain mobile database user;
- install antivirus software, thus avoiding the possibility of shutdown;
— update the installation of security updates on all devices of remote employees - workstations, smartphones, routers;
— perform backup copies of information on remote devices.
Such a problem does not arise if the company's information security (IS) system is built correctly, in accordance with IS standards, since in this case the protection of both work computers and connections will be properly organized in accordance with IS policies. And even more so, everything becomes problem-free if remote workstations are equipped with regular work computers of users and are accompanied by instructions on activating individual means of protecting computers and setting up secure connections.
To neutralize such contraindications
-
- Posts: 535
- Joined: Mon Dec 23, 2024 3:13 am