Remote Work Solutions Cheat Sheets
Our current events has brought about an immense challenge in companies to support their greatest asset, their people. With the onset of quarantines & social distancing to protect the general public, more companies are tuning to remote solutions to support their employees to remain secure and productive at nearly any location with internet connectivity. You'll hear this as “Work From Home, Remote Office,Home Office, Telecommuting, or mobile work." To make your conversations more effective with clients, here is a general guide of Ingram Micro’s vendors that support this initiative. The majority of these solutions are either software or cloud based so no need to worry about inventory!
|
Security Solutions For Everyone
Why Remote Work is Making Cybersecurity More Important Than Ever BeforeWith more workers setting up shop in their homes due to coronavirus, protecting the network is becoming imperative for companies, especially for industries with protected data. Working remotely leaves networks vulnerable to a range of different types of hacking scenarios—especially if workers are dialing into official networks using personal devices that haven't been vetted or using WiFi networks that aren't secure. This larger remote workforce will be more vulnerable to phishing emails and texts that look legitimate but actually contain malicious software.
We have never seen, on this scale, the potential problems that can arise when an entire agency, company or government institution is working remotely. Want to know what Ingram Micro has to offer? Take a look at our Security Linecard to see what solutions we can help you build. Contact [email protected] for Help Today
|
How to Secure Meetings from "ZoomBombing" |
Zoom is an easy-to-use videoconferencing tool with a generous free tier. With people around the world isolating indoors to protect themselves against the spread of the corona virus, it has never been more popular. But its popularity has also attracted trolls. The phenomenon of “ZoomBombing,” in which an uninvited guest uses Zoom’s screen-sharing feature to broadcast shock videos, has been on the rise. Most Zoom meetings have a public link that, if clicked, allow anyone to join. Trolls have been collecting these links and sharing them in private chat groups, and then signing on to other people’s calls to cause mischief.
Additional Collaboration Offerings |
Protect remote workers from phishing,
fraud, and cyberattacks
More companies than ever have shifted to a remote workforce. That means communication typically done inside a secure corporate network is now being done at home—the perfect scenario for hackers to exploit weak points in a business’s communications protocol and access sensitive data. With that in mind, let’s look at how you and your customers can leverage remote work, boost cybersecurity and ensure fraud prevention while minimizing the risk of cyberthreats.
Your awareness is key
The threat hacking poses to all remote work is potentially huge. Hackers will exploit any and every situation they can. From natural disasters to local emergencies, they will craft emails claiming to provide valuable, relevant information regarding current events. Another popular tactic is to send emails posing as a government agency (e.g., the FBI or IRS), commanding users to open the email and click. This is what is known as ‘phishing’ and is a popular hacking method for exploiting the perimeter of your network (your firewall, website, etc.) in order to gain access. Go phish In a phishing scenario, you receive an email that claims to be from a legitimate source, but is designed to trick you into clicking on a link or downloading an attachment as a way of gaining entry. One way to spot a phishing email is to look at the sender: Is this someone you know? Is the email address even from your work email domain? If you’re unsure, don’t click any links or download attachments. Phishing 2.0 Another wrinkle in phishing attacks: If someone you know (a co-worker or client you work with) gets hacked, the malware then automatically sends you an email from their email address. So, the email will look legitimate because it’s from someone you know, but it still contains malicious links or attachments. How can you spot this other type of phishing email? Look for other signs of strange behavior. Would this person normally insist for you to click a link or download a file? Another sign are emotional appeals urging you to “act now” or else—this tactic is banking on your instincts to trust the source AND act to avoid some kind of harm or unwanted outcome. Watch out for keyloggers Another popular trend is credential theft via a keylogger. A keylogger is a program that tracks every keystroke you make when you type on your keyboard. Once a keylogger is installed, a hacker can then scan your keystrokes to find out sensitive data, including usernames, passwords, etc. This is a less obvious cyberattack because the hacker can log in as you so you typically don’t notice anything is wrong until it’s too late. Hackers can install keyloggers when you click on phishing emails or download malicious attachments. If you see something, say something If your customers think they may have downloaded something malicious or clicked on a suspicious email, they should let your system administrator or IT staff know right away. This will allow your security staff to isolate the infected computer while tests are run on it to avoid spreading any malware further. Some signs of hacking could include a mouse moving on its own and opening files and apps, or if you lock your computer and notice it unlocks on its own. All corporate laptops should have some form of security or antivirus software installed—especially one that allows users to initiate a system scan themselves if they suspect the presence of malware. Employee education It’s important to educate remote workforces on the dangers of cyberattacks. Ingram Micro’s security experts recommend routinely sending emails to employees reminding them of threats. A built-in reporting system in your email client allowing employees to flag an email they find suspicious and send it to your security team for analysis is another good idea. You can also send out your own “fake” phishing emails to test employees. In the event someone clicks on your fake phishing scam, they would be sent to a site that educates them on the dangers of phishing. The latest security tech Sophisticated security technology is a must for effective fraud prevention. Most security architecture is invisible to employees, and that’s by design. There are certain aspects they can experience though, including Symantec software and security protocols like two-factor authentication. Companies work hard to secure their devices and their network, but the same isn’t true for personal devices. Employees should avoid using a personal device (phone, tablet or laptop) to do remote work. While convenient, unsecured devices are an easier target for hackers to exploit. And conversely, work computers shouldn’t be used for non-work activities. Logging into social media sites or personal email accounts also makes systems vulnerable to attack. When in doubt, talk to the experts If you have cybersecurity questions, let our experts help. Whether it’s digital transformation, updating your own workforce to be remote-capable, or securing your customers’ corporate computers and mobile devices, we’re here to support you. For questions, contact the Ingram Micro Consulting and Enablement Services team at [email protected]. |
Digital Transformation Solutions for Remote Work |
Don't let travel restrictions or remote work disrupt business-critical operations. Rely on Ingram Micro's Digital Transformation Solutions remote capabilities to keep your resellers on track
Want to Learn More?
Contact [email protected] or 1-800-456-8000 x76094 to discuss your resellers’ needs. |
UCC Solutions For The Remote Worker |
Have you noticed an increase in questions around Remote Worker Solutions? So have we!
These are teams that can support your questions, as well as the questions your reseller partners have for building out these solutions. As more resources are released, you will find them hosted on the UCC IM Connect page.
Contact our UCC Team Today: [email protected] | Cloud UCaaS: Ext. 77099
|