Ten things to keep in mind when evaluating remote users

When it comes to the workplace, IT has to deal with remote users. It’s a fact of life, and one of the reasons why endpoint security consumes a good deal of time and effort from the IT department. Jeff Hughes from Lumension recently gave us a list of ten things to consider during security evaluations of remote users.

If you’re reading this, there’s a good chance you’re doing so on a laptop. Laptops are a considerable part of an IT department’s budget, and are everywhere. IT has to do something for all the sales and marketing staffers who constantly travel, and the idea of lugging a desktop around just doesn’t sit well with them.

So you get them a laptop, and with it will come the joy of remote support, battles over application installs, and the issue of explaining why they do not need administrator rights. All of that is just the helpdesk alone, IT management has the job of crafting a security policy for remote workers, and this is much easier said than done.

Often it is the organization’s own users who cause the most damage on the network, and pose the most risk. This is why Hughes said that, “it makes sense to consistently and periodically review your security measures for remote users.”

For the organization itself, the first thing to consider when performing security evaluations for the remote workers is the use of VPN. Hughes said that it is wise to require all users to use the VPN, as it encrypts traffic from point to point.

At the same time, there is the issue of actually getting the staff to play along. As a contractor, I had to deal with remote users who often complained about VPN speeds, and the fix for those complaints required a serious investment at the colocation facility. However, the usage of a VPN for anyone working outside the office should be a mandatory requirement for network design.

The second and third items Hughes suggested revolve around anti-Virus and patch monitoring.

“This policy is easier to implement if you have issued company laptops. It's more difficult if the employee is using their own laptop. However, you should maintain a written corporate policy that requires all remote users to verify that they are using AV/AS software on their personal hardware. Many AV vendors offer considerable discounts on software purchased through the employer for the home user employee. Ask your AV vendor if they offer such a program,” said Hughes.

Patching, as mentioned, is the third item to review. All of the software on a remote worker’s system should be regularly updated. Not just the anti-Virus, but all applications. This means Adobe, Firefox, and all Microsoft or Apple operating system patches. More often than not, the lack of updates will lead to problems. When a remote worker who has a system infested with Malware enters the network, they can singlehandedly wreak havoc.

Password management, which is the fourth item on the list, is also important. Remote users need to be kept on the same schedule for password resets. The best practice is that passwords are changed every 90 days. There are snap-in products for Active Directory that will assist in this.

Lastly, there needs to be solid policy in place. “This policy must be read and signed by all remote users, which may mean your entire company. The remote usage policy should outline patching expectations of personal hardware and specify applications that are off limits when connected to the network,” Hughes noted.

Other items discussed by Hughes include five things for employee security. Such as a requirement that every laptop have a firewall installed on it. Some security suites include a firewall, but IT should make the effort to provide instructions on how to implement personal firewalls, such as the one in Windows or the one used by the corporate security suite.

Another item on the list deals with responsibility. This means keeping track of the laptop, and never leaving it out in the open where someone could walk off with it. The other item that will fall in line with this principal is encryption. Assume you ignored the responsibility part of laptop safety and someone walked off with it. Should the data be encrypted, then the information is useless. Most of the laptop thefts are done for the value of the hardware, not for information mining. Yet, there is always that risk that sensitive information will wind up in the wrong hands.

Lastly, Hughes offered his thoughts on social networking. “Be careful on the latest social networking sites. Web 2.0 has brought new security challenges with dynamic content sites (iGoogle, Facebook, etc.) that allow you to post personal and confidential information with the click of a mouse. This can get you and your company into big trouble down the road.”

Tell us, what is your policy for remote workers? How do you manage remote worker policy? Were there extra costs associated with its implementation?

Like this article? Please share on Facebook and give The Tech Herald a Like too!

From our Other Sites

McLaren 675LT Pictures

Some great shots of the forthcoming McLaren 675LT. This coupe will get you to 60mph in less than 2.9 second and go all the way to 205mph.

McLaren 675LT Details

McLaren’s 675LT will debut at this year’s Geneva show and promises some eye-popping performance. The coupe only 675LT has a 3.8 liter V8 that will get you from 0-60mph in less than 2.9 seconds and to 124mph in less than 7.9 secondsMore than a third of the parts have been changed compared with its stable mate […]

Octopus hunts on land, grabs crab (Video)

This crab is minding its own business searching the rock pools for food when suddenly an octopus leaps out of the water and grabs it. The amazing thing is that the octopus does not just jump on the crab it actually pulls it all the way back to the rock pool it came from. If you check the second video you will see it is not unknown for octopus to come out of the water and the one in the second video has a crab with it, though is not hunting one! Octopus Walks on Land at Fitzgerald Marine Reserve The video was taken by Porsche Indrisie in Yallingup, Western […]

Stunning Mars Rover Selfie

This image by the Curiosity Mars rover is not exactly your typical selfie. It is made up of a bunch of images taken by the rover during January 2015 by the Mars Hand Lens Imager. This (MAHLI) camera is at the end of the robot’s arm. For a sense of scale the rover’s wheels are about 20 inches diameter and 16 inches wide. Check the annotated image below for more information on the surroundings. Also if you really want to see some detail click this very large image, 36mb, at NASA.  

How the Sahara Helps Feed the Amazon (Video)

Sahara to Amazon
This cool video from NASA shows how dust is transferred across the Atlantic to the Amazon rainforest and helps nourish the plants growing there. For the first time scientists have measured the amount of dust and the amount of phosphorus in the dust. The later acts like a fertiliser and helps replenish the phosphorus the rainforest loses each year, around 22,000 tons. Amazing how something we perceive as being desolate like a desert actually has an important role in sustaining somewhere we see as teeming with life. Image and video from NASA’s Goddard Space Flight Center.

Bouncing Laser Guided Bomb (Video)

This amazing video shows a laser guided bomb bouncing back up after hitting its target. We actually think this is a non-explosive bomb designed to test guidance systems but it is still pretty remarkable and somewhat scary.

South Koreans Swallowed by Sinkhole (Video)

Thankfully the couple survived their adventure.
This amazing footage taken from the CCTV on a passing bus shows the moment two pedestrians in South Korea fall down a sinkhole in the street! Rescue workers managed to save the pair, who were treated in a nearby hospital for minor injuries. According to reports the city authorities and the Korean Geotechnical Society are looking into the cause.

Cheetah Pictures

Some Cool Cheetah Pictures Cheetahs are found mainly in Africa but also some parts of the Middle East. These sleek animals are the fastest land mammals in the world and can hit 60 mph in about 3 seconds, though they cannot maintain this speed for long. Cheetahs prey mostly on antelopes and smaller mammals but occasionally go for something bigger. We hope you enjoy these photos and don’t forget to check out the other speedy land mammals on our list of the fastest.

Sherlock Holmes Quiz

Sherlock Holmes
Sherlock Holmes was a man who absorbed information like a sponge and had a razor sharp mind. How much do you know about the famous fictional detective from the books?

22 years without Ferruccio Lamborghini

Lamborghini posted this photo today saying: “22 years without Ferruccio Lamborghini.” Ferruccio passed away on February 20th 1993 aged 76. Interestingly he started out making tractors!