Cyber Security Essentials for Your Remote Workers: Keeping Your Business Safe

$149.00

SKU: 411258

Description

Understand what you should consider to strengthen cybersecurity policies and practices.
The pandemic has changed working remotely from a forwardthinking perk to a business necessity. This change has dramatically broadened the attack surface upon which businesses must protect against attacks upon their business by hackers. The situation is complicated by the rushed way this change occurred, denying businesses the opportunity to methodically examine the people, processes, and technology that can safeguard business data. This topic is designed to address the question of what topics a business should consider strengthening cybersecurity policies and practices.

Date: 2024-02-29 Start Time: 1:00 PM ET End Time: 2:00 PM ET

Learning Objectives

* You will be able to understand the rise of remote workers and its impact on security.

* You will be able to identify complications associated with the increase in hacking activity targeting remote workers.

* You will be able to develop strategies for monitoring remote workers without infringing on privacy rights.

* You will be able to assess the use of machine learning for employee monitoring and its ethical considerations.

Introduction
• Approach
• Situation, Complications, Question
• People, Process, Technology
• Speaker Background

Situation, Complications, Question
• Situation • Rise of Remote Workers
• Complications • Increase in Hacking Activity
• Question – How Can We Better Secure Remote Workers?

People
• Deciding Who Should Be Remote
• Training Remote Workers
• Security Policies
• Compromise Risk, e.g. Malware, Phishing, etc.
• Monitoring Remote Workers
• Avoiding the 24/7/365 Issues
• It Support

Process and Policies
• Personal Use of Provisioned Device/VM
• Bring Your Own Device (BYOD) Policies
• Identification and Authorization (IAM) Policies and Procedures
• Access to External Storage
• USB, NAS
• Use of Cloud Storage, e.g. Onedrive®, Google Drive™, Icloud®, etc.
• Data Loss Prevention (DLP) Solutions
• Collaborative Platforms, e.g. Teams, Zoom®, etc.
• Encryption of Data in Transit and at Rest
• Multi-Form Authentication

Technology
• Provisioned Equipment, I.E. a Company Laptop
• Hardened Virtual Machines (VM)
• Virtual Private Networks (VPN)
• Automated (Forced) Security Updates
• Malware Protections, e.g. Norton™, Kaspersky Anti-Virus, etc.
• Ml Employee Monitoring

Conclusions

Questions

ASA ,HR Certification Institute ,CPE ,SHRM ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Patrick T. Cronin, Esq.-Accenture