<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Datashield's Top 5 Remote Work Tips

The following is a downloadable tip sheet that highlights Datashield's expert tips for remote working.


Click to download or click here.


At Datashield, we pride ourselves on our ability to protect our clients, especially during the pandemic. Our security experts have compiled a list of the top five tips for those looking to increase their security in a remote work environment.

If you have any questions or are looking to implement a stronger remote work security program, contact us today.

Deploying a strong Enterprise Endpoint Detection and Response (EDR)

People will always be the primary target in attacks against organizations, usually from varying forms of social engineering such as phishing, malicious ads, and watering hole attacks.  Ensuring that the devices that your employees connect to your network on are safe and secure should be a primary goal.  Having a cloud-based Enterprise EDR will allow you to monitor your employee’s computers, even when not connected to the company’s network.  This will provide great visibility and will help prevent any malware spreading from an infected employee’s computer.  


Utilize a VPN

Virtual Private Networks (VPN) provides protection not just for the user, but for the company as well.  Having a VPN that uses strong encryption practices, verbose logging, and supports MFA will enhance your overall security posture and ease of access into your environment.  Using a VPN will also allow you to apply various access control measures through your VPN policies.  

One common question is when to use a split tunnel versus a full tunnel.  Datashield recommends using a full tunnel, as this will route all traffic through the VPN and is generally more secure.  However, this can cause an impact on speed.  A split tunnel is used when there is a need to access local resources as well, but can be less secure if something isn’t being routed over the VPN tunnel. 


Multi-factor Authentication (MFA) Policies

Password re-use and overall weak passwords are primary targets for attackers. If your applications don’t support MFA or if the user’s password gets compromised without your knowledge, the attacker can access those services. While not unbeatable, having MFA on those user logins will impede most attackers and stop a user compromise.


Connect from trusted Networks

Educating your employees about the safety of where they are connecting from is crucial.  Employees should only be connecting from trusted networks, such as a home or office network.  Public Wifi’s, such as Starbucks or open hotspots, should not be used to perform work duties.  While a VPN can offset some of these risks, it is ill advised to use any untrusted networks. 


Separation of Work and Personal Data

Your company’s data is important.  Having computers that are purchased and secured by the company will limit that data’s exposure.  Restricting work related tasks and applications to be done on company issued computers only is important.  This will ensure that you can monitor those endpoints.  It is also recommended to avoid having personal accounts or applications on work computers, as you can’t control the security for personal applications.  


Additional tips provided by CISA: https://www.cisa.gov/telework-reference-materials-non-federal-organizations

Topics from this Article

Remote Access, VPN, EDR, Multi-Factor Authentication

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

Datashield's Top 5 Remote Work Tips

The following is a downloadable tip sheet that highlights Datashield's expert tips for remote working.

The Datashield Advantage: VMware Carbon Black

The following is a downloadable Datasheet that encapsulates Datashield's partnership with VMware Carbon Black as a premier endpoint protection platform.  It dives into the key advantages organizations receive when deploying Carbon Black and employing Datashield as a managed EDR provider.

Datshield Overview

The following is a downloadable document of Datashield's solution overview. Learn how Datashield is helping organizations create and maintain a sophisticated security strategy that stays ahead of the curve. Click to download or click here. Invest in your defense In today’s cyber security landscape, email and traditional anti-virus tools are no longer sufficient for organizations looking to defend against advanced persistent threats and targeted attacks. Datashield helps organizations create and maintain a sophisticated security strategy through our tools, processes, and team of experts.   Our Solutions Managed Detection & Response A truly resilient security strategy relies on people and management just as much as its tools and processes. Datashield employs some of the brightest minds in cybersecurity to staff its US-based SOC 2 Type-II certified facility. The security team’s expertise differentiates Datashield from its competitors.   Endpoint Detection & Response Traditional anti-virus solutions are no longer sufficient for organizations looking to defend against sophisticated attacks. Datashield deploys, tunes, and monitors endpoint protection platforms to provide greater network visibility and advanced features in a single lightweight solution.   Email Management In today’s cybersecurity landscape, email security tools are just the first line of defense against sophisticated cyber-attacks. Datashield helps clients set up and manage email security solutions, tailored to an organization’s complex needs and compliance requirements.   Vulnerability Management Discovering security infrastructure weaknesses is a critical process that is often overlooked due to budget constraints and knowledge gap. Datashield is able to provide affordable vulnerability management as a service, identifying, prioritizing and responding to threats.   Hire the best Datashield has been a leader in managed detection and response for over a decade, now backed by ADT.   People We take pride in our talented team across all departments. Our executive leadership have been long-time innovators in the cybersecurity space and our analysts are some of the brightest minds in the industry. Processes Our commitment to clients is creating powerful solutions and efficient processes. We rely on our proprietary technology, disruptive approach, and over a decade of experience to deliver world-class results to our clients. Technology Between our orchestration tool SHIELDVision, advanced SOC, and ability to integrate with a variety of industry-leading tools, we have the hardware and the software to provide advanced protection.   About Datashield Founded in 2009 Datashield, an ADT company, is one of the most tenured cyber security firms in North America. Our company provides end-to-end cyber security resilience solutions. We take the time to get to know our clients’ business needs and deliver sophisticated, tailored security solutions. Datashield has the experience and resources to efficiently and effectively set up, configure and manage virtually any SIEM appliance, email security tool, or endpoint platform--all from our US-based SOC 2 Type II-certified facility. Our partnership with ADT’s Commercial Security Services allows us to integrate and provide network security and other perimeter services. Additionally, our vendor relationships allow us to provide a wide spread of tools and features at competitive pricing.