Working from home: there is no escaping it anymore. The number of daily users on ‘Teams’ was 3 million in November 2020. And that number will only increase this year. Two thirds of managers expect that staff will continue to work from home for at least two days at the minimum. The shift from the office to the home office has resulted in IT-related challenges. In this blog, you can read the tips and tricks of Remco de Kramer from Microsoft, one of the speakers from our online event last month.
Anyone who has started working from home since last year has had to be creative about creating a home office. It is clear that it goes further than just a well-adjusted office chair alone. It is important to look at the next step: the security of our IT environment, so that we are also in line with the security policy within the organization. But where to start?
As we examine this issue, several questions will arise:
Not only do these questions provide insights into whether we are on the right track, but they also show us where any security weaknesses lie. And it is good to map that out, because weaknesses in our systems mean opportunities for cyber criminals.
In this blog from last week you could see the three steps that are important in setting up an external workspace. Remote access to apps, managing devices and apps and protecting corporate resources are central to this. It is not only important that attention is drawn to this, but also how this can be easily implemented. This can be rolled out in three phases, so that it does not generate additional work for the IT department afterwards.
It's time to take a closer look at this. Because working from home securely requires access to the various systems and apps without compromising on security. The last thing you want is for unauthorized persons to gain access to the secure environment of your organization. How do you do this effectively? By using multi-factor authentication (or MFA / 2FA) and Single Sign-on (SSO), where the risk of access to third parties can be easily limited.
Logging in with just a username and password is outdated. We need to look at stronger security. A simple and secure way to protect our employees. With multi-factor authentication you prevent unauthorized persons from gaining access to your secure environment. You add an extra layer of security, which means that you need an extra means in addition to your e-mail and password, which makes it difficult for cyber criminals to gain access.
One of the solutions is Microsoft Authenticator. Here you are asked to authenticate the user via a mobile app, using biometric data such as facial recognition and TouchID. This extra layer of security is unique to the user, giving you 99.9% protection against identity attacks. In short, this is how it works:
Your employees want to be able to use all apps easily. Easy logging is important here. Because the more hassle there is around a login process, the more opportunities we give cyber criminals to gain access to our data.
Look at it like this: every time we try to enter a secure environment, digital dangers are lurking. If the entry goes wrong, there is a good chance that we will take these threats with us. This is also the case with logging in. The more often we log in, the more chance that something can go wrong. With Single Sign-on you prevent this. By establishing the identity of your employees, granting access can be made easy. You log in once, after which your credentials are remembered. After this, you can easily use your apps without having to log in every time.
Your benefits:
If we make it easy for our employees, this ensures a strong defense within the organization. If they can work remotely, securely from within apps and systems, this is one less worry for your IT department.