Remote working

The new normal

Overnight businesses have changed how they operate and working remotely, or working from anywhere, has quickly become the new normal. Most businesses by now will have worked with their IT teams to provide remote working solutions for their staff to enable them to work from home.

A common and well documented topic that seems to be consistent across all businesses and people I speak with is that “this new normal” is here to stay in some capacity moving forward and as such planning IT systems in and out of the office should form the basis of all IT roadmaps.

There are many “quick fix” cloud services that enable businesses to overcome a technical challenge that enable their staff to work remotely (eg DropBox for remote file sharing). Often IT security and control of data is overlooked in favour of ease of use and quick deployment. As with any IT system, planning, security, management and reporting should be features that are considered from the outset and that are just as important as the user experience and cost of the product.

Working from home brings new challenges for business owners and IT managers. Securing your IT systems and data within your office environment is easier to manage and lock down. Remote working brings a number of security and device management challenges that I will cover below.

Arguably one of your largest cyber security risks are your employees. Educating your workforce with the basics will go a long way and will help protect your IT systems and data. There are a number of inexpensive online courses that staff can sit to help educate them in the basics. Are staff aware of phishing techniques and do they have a way or reporting any security concerns. Do they understand the importance in using secure passwords and are they using 2FA to access your systems. Do they have the right tools to securely share data across your team and with customers. If you don’t provide your teams with the tools they need, they will quickly and easily find their own solutions which could be highly disruptive to your business and data.

If your remote teams are using their own unmanaged devices to access your systems this could open up a whole number of IT security and data control concerns. It is very likely you will have little to no control over your data if you have adopted this method. If your team are working in this way and handing confidential or sensitive information you should review this urgently.

Who has access to your data? Controlling access to your data in a remote working environment can very quickly spiral out of control. You’ve given your employees the ability to access your files so they can work on them from home. Then what? Do they have the ability to then upload those files to their personal DropBox’s or GDrive, or to external drives. Once this happens you have lost control of your data and possibly worse.

Do your remote teams have adequate network security in place? Do their home computers have access controls in place (eg individual computer accounts that are password protected)? Are drives encrypted? Do other users at their residence have access to the same computer? Are these devices running the latest security patches? Are these devices accessing sites that could be considered high security risks? As you can see there are often many questions to consider if cyber security and controlling your data is important to your business.

Your team may have been working remotely for a few months now. All seems well, they have access to email and files and Zoom has become a daily ritual, but are all your IT systems being managed and maintained as if they were in the office? If you are not using an MDM solution to manage all your remote endpoints its likely that security patches have not been applied and best practise maintenance routines are not being carried out. Are AV and Malware scans being run along with other proactive maintenance and security routines? Neglecting these could quickly become a cyber security risk and in turn a risk to your data.

Now take another scenario where you need to furlough or make a remote member of your team redundant. How do you disable access to all your IT systems efficiently and securely and have the confidence that the remote employee can no longer access your data. This is where having the right cloud platforms and IT team is essential. The same goes for new starters. Having the ability to onboard new members of the team remotely and provide them with preconfigured devices is going to be an essential part of your IT strategy.

There are many more areas for your IT team to consider such as streamlining and integrating cloud and on-premise IT systems, SSO, backup, archive and business continuity. Ask your IT team how they will manage your next round of operating system upgrades across a remote team, if they are not sure its time for a review.

Roadmap have managed solutions for all of the above and more, from zero touch deployments, to detailed reporting and monitoring of your remote assets and users. We empower businesses to work remotely efficiently and securely.

Credits: Image supplied by Freepik.com

Managed cloud IT platforms and COVID-19

Wildcard PR are a well established and successful PR agency based in London, Bristol and Truro. 

Last year Roadmap worked with Wildcard PR to transform their IT to meet the changing needs of their business. Our brief, to build and support a platform that would allow their team to work securely from any location, without losing the functionality and security they currently had from working within the same office. The London team would be moving to a WeWork and needed the ability to work from any of the WeWork breakout areas. As staff and teams would be working remotely, Wildcard were aware that there would be an ever greater importance on securing their systems to avoid data loss or leakage.

As Roadmap would be managing Wildcard’s technology we also needed to build a system that would enable us to manage all their systems remotely.

Our solution focused on the clients needs, IT management and data security. 

We set about rebuilding and in some instances upgrading all of their computers and mobile devices to ensure all the builds were configured consistently and would meet the needs of the new technology we would be introducing. We used Meraki Systems Manager (MDM) and custom scripting to help deploy systems and software and applied the agreed IT security profiles to all devices. From this point onwards Roadmap now had a secure remote platform for managing system and software patches, remote access, reporting and monitoring tools. In addition Roadmap Protect was installed on all endpoints to help Roadmap proactively monitor for malware, hardware or network issues.  

The old on-premise Active Directory server was replaced with JumpCloud and Egnyte. JumpCloud, a cloud based directory enabled Roadmap to manage all the user accounts securely using 2FA across endpoints and cloud based platforms. Egnyte, a secure cloud based file sharing platform revolutionised how the team could now access and share files both within the office and remotely and was integrated with JumpCloud for SSO and centralised user management. Importantly the Egnyte user experience was very similar to how users had worked when accessing files within the finder, this familiarity was very helpful with user adoption.

Office 365 was already being used but Roadmap integrated this with Jumpcloud for SSO and centralised user management.

Code42 was used to help secure endpoints by backing up data remotely, protecting the business from accidental or purposeful deletion. The backup functionality also doubled up to protect users from Ransomware threats. Code42 also enabled the management teams to monitor and report on endpoint usage, an essential tool for a disparate work force. 

On-premise accounting systems were moved to cloud based alternatives. 

Telephony and VoIP were moved to a platform that enabled users to communicate over soft phones, or web based video conferencing.

The network equipment within the offices was replaced with Meraki equipment, helping complete the remote management and visibility Roadmap needed to ensure all sites could be managed remotely. This was also tied to JumpCloud for added security and SSO.

Once all the work was complete Roadmap IT organised a Cyber Essentials + audit which Wildcard passed with flying colours.

Roadmap managed the whole transition and implementation. The customer was extremely pleased and user adoption was quick and painless.  

Fast forward to March 2020 and due to the Covid 19 Pandemic businesses were quickly realising the importance of having systems in place that enabled their teams to work remotely. In recent days and weeks, we have helped almost all of our customers adapt their technology to enable their teams to work remotely but for some this has been a reactive process and with the obvious time restrictions has only addressed their immediate needs which typically have been around file sharing. Wildcard have been in an enviable position where their teams could simply take computer equipment home and continue to operate their technology securely as normal.