CONTACT US

Have a Question or Need Quick Help?

Send us a message or use the chat function and a technician will jump right on it. Our technicians are available 24x7, after hours and on the weekends to respond to emergencies.

Use this form to sign up for our weekly newsletter.

ROARK TECH SERVICES

575 Fifth Avenue, 15th Floor

New York, NY 10017

info@roarktechservices.com

(212) 682-3555

  • LinkedIn - Grey Circle
  • Twitter - Grey Circle
  • Facebook - Grey Circle
  • Instagram - Grey Circle
557936e7c744c980dc54df2ac0db6601.png

copyright 2020 Roark Tech Services

Search

COVID-19: What’s Your Remote Access Readiness Plan?

Updated: Mar 10


With schools and office buildings closing on a moment’s notice, now is the time to test the ability of your organization to accommodate the need for everyone to work remotely, at once! The ability to carry on business during this crisis will underscore the organizations preparedness. If forced to close its doors, your organization must ensure staff can reliably – and securely -- work from home while avoiding an onslaught of calls to the IT department for setup, issue resolutions or general help on navigation to their critical files.


It’s reasonable that most organizations employ some type of remote access, but these solutions are most likely tested under limited volume and circumstances. Preparing for the majority of employees to work remotely – all at the same time – requires planning, testing and possibly infrastructure improvements.


Here are some tips to keep your organization safe, users effective and your IT department out of fire-fighting mode.


Examine Last Login Reports. Depending on the remote access solution you use, reports are generally available to determine when a user last logged in from a remote location. Understanding who recently and successfully recently logged in will save you time and let you gauge the capacity of your solution.


Enable Two-Factor Authentication (2FA). Also called multiple-factor or multiple-step verification, it’s an authentication mechanism to double check that your identity is legitimate. It requires two verification factors, a password and a second factor, usually an authenticator code on a mobile device to login. This ensures that a hacker cannot gain access to your account with only a password.


Update Software to make sure every device connecting to the network has the latest security patches. Software companies continuously monitor the environment to catch hackers before they catch you.


Firewalls. Verify your firewall is setup properly and tested. Our experts can help you verify this in minutes.


Set Policies That Support Safety.

  • Set a policy that automatically locks the computer after a few minutes of inactivity. This helps prevent someone from jumping on an employees computer after they walk away.

  • Set a policy that turns off the screens when someone is working remotely.

  • Set a policy that locks-out an account after a certain amount of incorrect password attempts.

Enable Network Level Authentication. Most servers include Network Level Authentication (NLA) by default. It is best to leave this in place as NLA provides an extra level of authentication before a connection is established. Make sure this is up and running. Our experts can help you verify this in minutes.


Enforce Strong Passwords / Pass phrases on all users, especially those with remote access capability. Password best practices.


Contact us to learn more about how to prepare your organization for safe, efficient and scalable remote access capabilities.

37 views