24x7x365 e360 Client Technical Support: Call (877) 368-4797 opt 9, or

As working from home continues to expand and becomes the new normal for many, are the policies and systems you put in place during the emergency work from home period adequate and secure enough to protect you and your workforce?

Based on a recent study publish by Garter: Gartner Managing Ambiguity in Crisis Escalation Procedures report:

  • 12% of organizations were prepared for the impact of COVID-19
  • 38% of organizations expect expanded/universal work from home to persist long term
  • 667% increase in spear-phishing attacks since February 2020

Set access policies for remote workforce.  

If you have deployed SSO and MFA to all your employees, consider creating more granular access policies based on user, device, network and location context. Ideally, you can create granular access policies that align the strength of the policy to the potential risk associated with the login. Examples of these policies include: 

Disallow POP/IMAP based authentication to Office 365

POP/IMAP protocols bypass multi-factor authentication requirements. Because of this, it’s best to block access to Office 365 from these protocols altogether.  This should be supported by policy that requires MFA for all remote access.

Creating network blocklists

If your organization needs to block access from known bad networks, anonymized browsers, or risky geolocations, create policies that either deny access or prompt for additional authentication when a user accesses their apps from these types of networks. 

Email notifications for end users

End user visibility is important. As remote employees may need to access corporate resources across different device types, it’s helpful to have notifications sent to users when suspicious or infrequent activity like new device logins, MFA enrollment, or MFA resets are detected on their account. 

Enable managed device checks for mobile and desktop devices

A remote workforce means you’ll likely need to allow Bring Your Own Device (BYOD) to eliminate any sort of end user friction when accessing apps. To ensure that only known, managed devices are accessing corporate resources, integrate your SSO solution with an endpoint management vendor to deny access or prompt end users for enrollment on unmanaged devices. 

https://www.okta.com/resources/whitepaper/secure-remote-work-toolkit-ebook/

Services

Security

Creating a strategy for managing risk and compliance while helping to filter the myriad of cybersecurity technologies

Modern Infrastructure

Empowering your enterprise to its greatest potential through an efficient and secure IT infrastructure

Digital Workplace

Helping businesses keep infrastructure up-to-date, minimizing security risks, and maintaining compliance

Cloud Enablement

Accelerating IT service delivery through the adoption of agile methodologies using systems-oriented approach

Microsoft Expertise

Helping set goals and establishing benchmarks with the successful deployment of Microsoft solutions

Enterprise Managed Services

Best IT practices with design, configuration, implementation, licensing and environmental services

Markets and Market Support Vehicles

Business

Professional services and renowned expertise aligned with the trends and challenges facing a variety of industries

Healthcare

Addressing IT challenges faced by healthcare organizations through trusted services, solutions and relationships

Public Sector

Helping organizations manage costs and high availability while increasing security, compliance and efficiency

Group Purchasing

Industry-leading IT consulting services and technology solutions through a streamlined contracting process

Resource Library

Events

e360 in-person and online events

Solutions Literature

Access content on e360 services

Blog

Read about trending technology

Press Releases

Get official updates about e360

News Stories

Read about industry and e360 news

Media

e360 webinar and podcast content

About e360

Who We Are

Our mission, vision, leadership and team

Accolades

e360 awards and recognition

Privacy

e360's commitment to privacy

Community

e360's commitment to privacy

Careers

e360 career opportunities

Connect With e360

e360 locations and contact resources