Working Remotely

Remote Work Resources

Keep safe and empower your coworkers with the best remote tools, practices and tips. 5NINES is ready to provide any assistance and support to enable your company’s successful transition to working remotely.

If working remote is entirely new to your company and you don’t know where to start contact us today and we can help you get a plan in place.

Microsoft Teams & Office 365

Microsoft Teams & Office 365 is easy to get, but utilizing all its features takes skill. 5NINES can train you and your team how to leverage these tools in order to keep remote work productive and engaging.

What is Microsoft Teams – quick introduction video about MS Teams 

Security and compliance in Microsoft Teams – learn about MS Teams-specific information security and compliance

Work remotely with Office 365 – get started with MS informative video on Office 365 features 

Top tips for working more securely from home – learn how organizing your workspace, keep your data secure, and better communicate with your coworkers 

With Mail Assure and Veeam Backup for Microsoft Office 365 your emails are protected against phishing, malware and spams. All your emails, calendar, contacts, files on SharePoint and OneDrive are automatically backed up and secured against data and access loss. 

Interested in setting up MS Teams, Office 365 or securing your emails? Please fill out the form below and we will contact you shortly.

Cybersecurity Tips

While many companies are deploying a remote work policy to comply with State and local Health authorities’ direction, protecting your company’s infrastructure integrity is paramount. This is a significant cybersecurity issue that requires your attention.  We’d like to offer some advice and recommendations as you implement your remote work policy to ensure the digital safety of your company and employees.  

Best Cybersecurity Practices for Working Remotely:

  • Use secure/encrypted communication channels such as secure VPN to access company assets.
  • Install updates regularly.
  • Disable pop-ups on home system web browsers and ensure they are updated to the most recent release.
  • Limit the download of working documents onto personal machines and/or devices.
  • Enforce proper Antivirus and Patch Management protocols
  • Deploy and enforce strong requirements for authentication.  Complex passwords and the implementation of two-factor authentication (preferably with a token device) should be required.
  • Create and distribute a work-from-home policy that highlights an employee’s responsibility to keep the security of the company and client information a top priority (e.g. we suggest companies establish a follow up phone call policy or two-factor authentication on financial or information requests made via email or chat means).
  • Lock your device when unattended. 
  • Exercise good judgement in regards to social engineering/phishing attacks. Beware of Coronavirus domains and spam email campaigns from false addresses.
  • Ensure all employees contact IT in the event of suspicious behavior on their machines.
  • Ensure that proper back up procedures are in place and are successfully executed.
  • Beware of inserting USB devices to your computer. Especially, if they don’t belong to you.
  • Keep in mind, the Center for Disease Control and Prevention (CDC) will never directly send you emails. If you received one, don’t click on any links or download any files.
  • Check URLs to see if SSL encryption is implemented (a little lock next to the URL).
  • Beware remote desktop tools.
  • In public places turn off automatic connections to WiFi and use private browsing.
  • Secure in-home routers correctly through proper configuration.

Know these information security tips from Infosec

Our partners at Infosec created this cybersecurity infographic to help your remote workers take simple but important steps to secure their working-from-home environment. More resources including cybersecurity training courses and downloadable “Remote Working Awareness Kit” can be found in the link below.

1. Do not click on hyperlinks in emails
A lot of attackers will mask a harmful webpage up by hiding it under a hyperlink. If an email is instructing you to go to their website for any reason, go onto that company’s website directly by searching for it in the address bar. 

2. Verify any request via phone or in person
Some attacks are carried out by attempting to ask the user to send money or information through email. These methods can pretend to be another company as well as an insider executive (e.g. a CEO). To prevent this, it is best to call the company directly or talk to the person who is requesting the receiver’s input in a way that you can verify them. 

3. Disable pop-up notifications 
Pop-up phishing is a tactic where cyber criminals deploy pop-up messages that may encourage the user to call a scam service, direct them to a fraudulent website, or prompt them to put in personal information. These pop-ups can even infect usually legitimate websites. The best way to combat this is to disable pop-ups all together. 

4. Have an antivirus software installed and up to date 
While avoiding risky websites and staying away from anything suspicious is best practice, there is always a possibility of the user being tricked in some way. To avoid the computer from being infected with malware, an antivirus should be in place and regularly updated to catch any malicious code. 

5. Keep up to date on current phishing attempts 
Scammers and attackers utilize current trends and headlines to draw their victims in. Understanding the methods attackers use as well as overall templates/buzz words can help in knowing what to be more cautious with while online. 

Anti-Phishing Best Practices

As many companies are instructing their employees to work from home, online threats are becoming more frequent. The easiest and most used method these threats use is done through social engineering via phishing. This is done through email as well as webpages and attempt to trick the user into thinking the information is legitimate. Attackers can also put malware onto the users’ computer, ciphering more information from the device. We’ve gathered some of the best practices to keep in mind during this time to keep you and your business well protected from these attacks. In addition, 5NINES offers Security IQ phishing awareness products to maximize your protection from cyber criminals. 

Anti-Phishing Best Practices

As many companies are instructing their employees to work from home, online threats are becoming more frequent. The easiest and most used method these threats use is done through social engineering via phishing. This is done through email as well as webpages and attempt to trick the user into thinking the information is legitimate. Attackers can also put malware onto the users’ computer, ciphering more information from the device. Here are some of the best practices to keep in mind during this time to keep you and your business well protected from these attacks. 

1. Do not click on hyperlinks in emails
A lot of attackers will mask a harmful webpage up by hiding it under a hyperlink. If an email is instructing you to go to their website for any reason, go onto that company’s website directly by searching for it in the address bar. 

2. Verify any request via phone or in person 
Some attacks are carried out by attempting to ask the user to send money or information through email. These methods can pretend to be another company as well as an insider executive (eg. A CEO). To prevent this, it is best to call the company directly or talk to the person who is requesting the receiver’s input in a way that you can verify them. 

3. Disable pop-up notifications 
Pop-up phishing is a tactic where cyber criminals deploy pop-up messages that may encourage the user to call a scam service, direct them to a fraudulent website, or prompt them to put in personal information. These pop-ups can even infect usually legitimate websites. The best way to combat this is to disable pop-ups all together. 

4. Have an antivirus software installed and up to date 
While avoiding risky websites and staying away from anything suspicious is best practice, there is always a possibility of the user being tricked in some way. To avoid the computer from being infected with malware, an antivirus should be in place and regularly updated to catch any malicious code. 

5. Keep up to date on current phishing attempts 
Scammers and attackers utilize current trends and headlines to draw their victims in. Understanding the methods attackers use as well as overall templates/buzz words can help in knowing what to be more cautious with while online. 

Check out our Work From Home Checklist

This downloadable checklist will help your employees transition smoothly to a more secure and engaging experience working from home.

Remote User Management and Setup Plan

 

5NINES Managed Services offers Remote User Management and Setup Plan of $20 per user/per month plus a one-time set-up fee of $100.

This includes:

  • 7×24 call center
  • asset tracking
  • monitoring & security
  • configuration management
  • anti-virus protection
  • regular patch updating. 

If you are interested in implementing our service or learning more about working remote, please email us at inquiry@5nines.com or fill out our form.

Verified By: