Remote Work Checklist Controls
Remote Work Checklist Controls
Remote Work Checklist Controls
www.secromix.co.za info@secromix.co.za
Purpose of This Document
The global Coronavirus crisis implements a quarantine policy that is becoming increasingly
difficult for many economies. This policy, in turn, causes cyber attacks targeting remote
connection credentials and vulnerable personal devices and unprotected endpoints. This
chaotic situation puts a heavy burden on the shoulders of Chief Information Security
Officer (CISO). This template is designed to be concise, clear, and actionable, with all the
essential apps to check out to ensure that cyber defenses survive successfully during this
difficult time.
This document has emerged as the result of numerous interactions of SMSK Information
Technologies (SecroMix) with Information Security Managers and security organizations. As
SMSK (SecroMix), we aim to circumvent this process in a healthy way with the idea that
the attackers will want to take advantage of the gap formed during the coronavirus
quarantine, they will try to evaluate the current conditions well and will not hesitate to
apply various attack vectors. Our goal is to simplify and optimize the protection process of
Information Security Managers with an easy-to-use template that can easily adapt to an
organization's need.
www.secromix.co.za info@secromix.co.za
Secure Remote Work Checklist
Template Steps Check
Use MFA for remote connection.
Secure e-mail.
Review or create sign-in policies (based on time, geographic location, concurrent
sessions, etc.)
Security Team Make sure that a well-defined “Incident Response” procedure is available.
.
Providers Security monitoring and management assistance
.
Incident Response (IR) team
Information Security awareness trainings of employees and measurement of
security levels in certain periods
.
explained Gaps and potential effects explained
Gaps and potential effects explained
www.secromix.co.za info@secromix.co.za