Azerbaijan airline blames 'external interference' for plane crash    At least 69 dead after boat sinks in Morocco waters    Israel strikes Sanaa airport and other Houthi targets across Yemen    Two die in Sydney to Hobart yacht race    Ukraine captures injured North Korean soldier, says Seoul    Lulu Retail expands in Saudi Arabia with two new stores    Absher launches service to report about absconding of visit visa holders    Warehouse of counterfeit products busted in Riyadh    Indonesia's Consultative Assembly speaker hails MWL's efforts in disseminating moderate image of Islam Sheikh Al-Issa receives Al-Muzani at MWL headquarters in Makkah    King Salman receives written message from Putin    Saudi Arabia to host Gulf Cup 27 in Riyadh in 2026    Saudi Arabia, Bahrain secure wins in thrilling Khaleeji Zain 26 Group B clashes    Celebrated Indian author MT Vasudevan Nair dies at 91    RCU launches women's football development project    Damac appoints Portuguese coach Nuno Almeida    RDIA launches 2025 Research Grants on National Priorities    Financial gain: Saudi Arabia's banking transformation is delivering a wealth of benefits, to the Kingdom and beyond    Blake Lively's claims put spotlight on 'hostile' Hollywood tactics    Five things everyone should know about smoking    Do cigarettes belong in a museum    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



How to secure a work-from-home organization
Published in The Saudi Gazette on 02 - 04 - 2020

Over the last few days, a slew of people have texted or called me for practical guidance on how to secure a global, work-from-home organization. So, I crafted this short-ish post, mostly as a public service announcement. It's not intended to be exhaustive.
Secure cloud-based applications
Every decision and technology investment you make will have long-term implications for your organization's security. If you haven't already done so, lock arms with IT to secure your software-as-a-service (SaaS) applications via cloud access security brokers for configuration, security and data loss prevention. While you're at it, integrate all your SaaS solutions into one central identity and access management solution. You'll save yourself a lot of time and headaches in the long run.
Restrict access to infrastructure-as-a-service providers
At the same time, you should begin working with product engineering to reduce access to infrastructure-as-a-service providers. At Tenable, we set up privileged access management for products like Tenable.io to restrict access to critical systems and data. Use jump boxes, which will give you the ability to access and manage devices in a separate security zone, to reach your critical systems. That way, you limit access to a defined path and reduce your risk.
Add IT systems management onto laptops
Make sure your laptops are fully configured with endpoint protection and detection. Far too many people, including the most tech-savvy, ignore system updates and patches. You can mitigate your risk by adding IT systems management onto your laptops, so that you and your team control software updates and patching. It's a pretty basic, but super effective step.
Use local vulnerability detection agents
Most people these days have a variety of connected devices — TVs, doorbells, baby monitors, etc. — in their homes, not to mention multiple personal laptops and tablets. Every time they log into their laptop or tablet, each of those devices becomes part of your enterprise attack surface. Since you likely won't be able to run network vulnerability scans, ensure you have local vulnerability detection agents like Nessus installed to provide off-network visibility. At Tenable, most of my colleagues don't need virtual private network (VPN) access. But VPNs can be a viable option if used properly.
Make sure business continuity plans have critical details
I think it goes without saying, but every organization should build business continuity plans. Start with a business impact analysis (prioritizing the order of operations for people, assets, processes, etc.). Consider financial and operational impacts, along with management tolerances and resource dependencies. Document where your critical data resides and your high-risk users (e.g., executives, those with administrative privileges, those developing source code) and maintain an accurate inventory of their devices. You'll also need a crisis management plan to communicate across the workforce quickly and effectively.
We're here for you
We built Tenable from the ground up to empower a remote and agile workforce. We know what system and network traffic patterns look like when most people are working from home — not everyone will have this experience. We understand what patterns to investigate. Our people have the tools they need to work securely and efficiently from anywhere in the world. We're happy to share what we've learned along the way. — SG
— the writer is chief security officer of Tenable


Clic here to read the story from its source.