• Home
  • Keeping Your Business Secure, Made Simple
Security Blog

Keeping Your Business Secure, Made Simple

Recent events mean that companies have had to, in many cases, ‘fast-track’ a move to remote working. This was easier for some businesses than others, however for almost every company, this is not something that had needed to be considered at this scale and for the entire company. 

The key priority here is functionality - making sure users can still carry out their work no matter their location. However once this is accomplished, it is also critical to ensure security of your business and systems. The majority of organisations will have had a good level of security protecting office-based employees, however such solutions often don’t lend themselves well when outside the office.

We’ve pulled together this blog to help you address these challenges and ensure that your users, devices and data are fully secured despite your workforce being geographically dispersed. You can also download our recently released Security Guidebook which delves deeper into the below:

Protecting Your Users

Users are crucial to maintaining the security of a company’s environment, however they are often the target of malicious hackers who might try to impersonate legitimate emails to access user credentials. These risks increase with remote working, as policies and logs are spread across many locations. Therefore, adapting your security procedures to ensure your users are protected no matter where they are working from is critical. There are three key areas to focus on to help you achieve this:

Multi Factor Authentication 
Securing access to data centre, cloud and SaaS infrastructure securely

Secured Internet Browsing
Ensuring that a user’s remote internet access has the same security features as it does in an office

Any Device VPN
VPN access is still required for many companies in 2020 and beyond, in order to access crucial legacy apps

These can be achieved through a number of routes, including with native Microsoft solutions that many companies will have existing licenses for, and complimented with leading security vendors where needed.

Protecting Your Devices

Previously, end user devices may have been based purely in the office for traditional desktop users, or you might have had a mix of on and off the network for laptop users. Now, devices need to be able to be managed and secured no matter where their physical location. A breach can cause reputational damage, loss of earnings and even permanent closure. To avoid this, you need to be able to adapt your technology to cope with these new challenges. Here are 3 key areas to focus on:

-   Remote device management
-   Secured Internet Services
-   Encrypt your devices (and data)

These can be achieved through a number of routes, including with native Microsoft solutions that many companies will have existing licenses for, and complimented with leading security vendors where needed.

Protecting Your Data

Data has historically sat within secured data centres, accessed through corporate networks using corporate devices. However, that has now changed, with data moving to the cloud and SaaS services and users working from home offices, and sometimes using their own equipment. The data must be secured, but at the same time should be accessible through frictionless security. We need to ensure that data is only accessed by the right people using appropriate devices and that data does not leak accidently or maliciously and fall into the hands of the wrong people. We need to ensure three things:

-   We can secure all of the users’ files and be able to recover from loss
-   Protect the files so if they end up in the wrong location, they cannot be accessed
-   Provide secure B2B data sharing for when you need to provide data to your customers/suppliers

This can be achieved using a number of tools both inherent within Office 365 and the EMS suite, but also using other products and services that Ultima can license, deploy, configure and maintain for you.

If you would like to learn more about how to protect your users, devices and data in these testing times, download our Security Guidebook here and get in touch to talk about our Cyber Security Assessment

 

chris blog

Written by Chris Watkins, Head of Security

 

Related Resources