REMOTE WORKFORCE RISK ASSESSMENT

The rapid transition to a remote workforce also presents additional or new cybersecurity considerations. Beyond your company’s employees, contractors, business partners, vendors, and others may require remote access to systems to perform work from external locations. Remote access technologies, including company issued devices and employee owned devices (BYOD), should be secured against a variety of threats as should the connections to the organization, which many times involve home-based devices.

Your IT department, executives, and Board members may now be asking questions such as:

2

Am I compliant or more vulnerable with remote employees now than in-office?

1

How much money is at risk if we have a breach?

3

Are my applications secure enough for a remote workforce?

4

What are the cybersecurity risks of having a mobile/remote workforce?

5

What do I have to do to secure my data?

6

What do I need to know to manage a remote workforce?

SCA’s Remote Workforce Risk Assessment will help answer the above questions through the lens of the most common security objectives for remote access technologies including:

Ensuring remote access communication and stored data cannot be read by those without authorization to do so.

Confidentiality

Integrity

Detecting intentional or unintentional changes to remote access communication that occur in transit.

Availability

Ensuring users can access systems and resources through remote access when needed.

The Remote Workforce Risk Assessment evaluates your company’s remote access/worker security posture following a risk-based approach to cybersecurity. The risk assessment methodology is based on NIST SP 800-30, Guide for Conducting Risk Assessments, and incorporates NIST SP 800-46 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security, the NIST Cybersecurity Framework and NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations.

3

Are my applications secure enough for a remote workforce?

6

What do I need to know to manage a remote workforce?

What do I have to do to secure my data?

5

Am I compliant or more vulnerable with remote employees now than in-office?

2

1

How much money is at risk if we have a breach?

What are the cybersecurity risks of having a mobile/remote workforce?

4

Your IT department, executives, and Board members may now be asking questions such as:

REMOTE WORKFORCE RISK ASSESSMENT

The rapid transition to a remote workforce also presents additional or new cybersecurity considerations. Beyond your company’s employees, contractors, business partners, vendors, and others may require remote access to systems to perform work from external locations. Remote access technologies, including company issued devices and employee owned devices (BYOD), should be secured against a variety of threats as should the connections to the organization, which many times involve home-based devices.

Get Started NOW!