{"id":4601,"date":"2020-03-16T13:19:33","date_gmt":"2020-03-16T13:19:33","guid":{"rendered":"http:\/\/dev.cynance.co\/?p=4601"},"modified":"2020-10-27T13:33:55","modified_gmt":"2020-10-27T13:33:55","slug":"work-from-home-security-awareness-tips","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/work-from-home-security-awareness-tips\/","title":{"rendered":"Work From Home Security Awareness Tips"},"content":{"rendered":"

[vc_row][vc_column][vc_column_text css=”.vc_custom_1584451241267{padding-bottom: 50px !important;}”]So some\/ many\/ all your employees are working from home? Now what? How long will it last?
\nCynance<\/a> information security consultants are here to help you with security advice regarding teleworking security risks.<\/p>\n

Whether you want to:<\/p>\n

– Receive a second opinion about your architecture, designed to support teleworking<\/p>\n

– Verify that the network authentication solutions used by your company provide you with the strong authentication you are looking for<\/p>\n

– Review your teleworking practices and procedures<\/p>\n

– Validate that your data exfiltration solutions are configured properly and actually perform as intended<\/p>\n

– Run a phishing campaign on your behalf to raise employees’ security awareness, when they are far from sight<\/p>\n

– Test your Citrix or any other remote desktop solution for potential security flaws and misconfigurations<\/p>\n

– Ensure that users cannot leverage their privileges and access sensitive network resources without permission<\/p>\n

– Ensure that your SOC detects remote users\u2019 potentially malicious action and reacts in time<\/p>\n

Feel free to contact us at contact@outofsite.biz<\/a>, even if you just want to exchange free thoughts about #WFH<\/a> related security.<\/p>\n

#cybersecurity<\/a> #informationsecurity<\/a> #consulting<\/a> #hacking<\/a> #ethicalhacking<\/a> #security<\/a> #gdpr<\/a> #ciso<\/a> #dpo<\/a><\/p>\n

http:\/\/dev.cynance.co\/network-infrastructure-security\/#network-architecture[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

Cynance information security consultants are here to help you with security advice regarding teleworking security risks.<\/p>\n","protected":false},"author":4,"featured_media":6309,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4601"}],"collection":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/comments?post=4601"}],"version-history":[{"count":0,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media\/6309"}],"wp:attachment":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media?parent=4601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/categories?post=4601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/tags?post=4601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}