{"id":7351,"date":"2020-05-11T10:47:13","date_gmt":"2020-05-11T17:47:13","guid":{"rendered":"https:\/\/nkn.org\/community\/blog\/5-steps-to-secure-remote-access-nkn\/"},"modified":"2020-12-12T15:55:45","modified_gmt":"2020-12-12T15:55:45","slug":"5-steps-to-secure-remote-access-nkn","status":"publish","type":"post","link":"https:\/\/nkn.org\/zh-hans\/community\/blog\/5-steps-to-secure-remote-access-nkn\/","title":{"rendered":"5 Steps to Secure Remote Access | NKN"},"content":{"rendered":"\n<p>Remote access is essential for most businesses because of the<a href=\"https:\/\/www.forbes.com\/sites\/hvmacarthur\/2020\/04\/05\/effective-time-management-while-working-remotely-during-the-covid-19-pandemic\/\"> COVID-19 pandemic<\/a>. It\u2019s crucial to <strong>ensure that<\/strong> <strong>remote access is safe and secure<\/strong>, especially since\u00a0 hackers and cyber attacks are likely to try and exploit the vulnerability of businesses during this transition.<\/p>\n\n\n\n<p>In order to ensure that all your staff is working on a safe network, some processes need to be in place for it to be effective. <strong>Keeping your data safe is essential<\/strong>, so here are <strong>five steps to secure remote access for your business<\/strong>.<\/p>\n\n\n\n<p><strong><em>Related: <\/em><\/strong><a href=\"https:\/\/blog.nkn.org\/secure-remote-file-access-for-network-attached-storage-nas\/\"><strong><em>Secure Remote File Access for Network Attached Storage (NAS)<\/em><\/strong><\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>What Does A Security Manager Do?<\/strong><\/h1>\n\n\n\n<p>A <a href=\"https:\/\/www.floridatechonline.com\/blog\/information-technology\/cybersecurity-manager-career-guide\/\"><strong>cybersecurity manager<\/strong> <\/a>is worth putting in place to help <strong>oversee your IT systems<\/strong>. They mainly work on the<strong> protection and detection of threats to the system<\/strong>. The goal is to plan accordingly in case of a cyberattack incident while also responding to the detection of threats and cyberattacks.<\/p>\n\n\n\n<p><strong>Strengthening the remote access you have<\/strong> is necessary to avoid these dangers online, and a security manager can certainly help to do that. In addition to detecting threats, they should also be<strong> working with staff to help reduce the risk of cyberattacks<\/strong> with relevant training and policies in place.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Why Would You Need To Secure Remote Access?<\/strong><\/h1>\n\n\n\n<p>As much as <strong>remote access <\/strong>can help employees work from home or on the move, it\u2019s become a <strong>target for modern hacking and data theft.<\/strong> There&#8217;s a growing number of people using online applications and services, so the threat of becoming victim to malicious attacks continues to grow.\u00a0<\/p>\n\n\n\n<p>For example,<strong> <\/strong><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/20\/data-breaches-expose-41-billion-records-in-first-six-months-of-2019\/\"><strong>data breaches<\/strong><\/a><strong> exposed 4.1 billion records <\/strong>in the <strong>first six months of 2019<\/strong>, and this is concerning because <strong>a lot of personal data could be leaked<\/strong>.<\/p>\n\n\n\n<p><strong><em>Need a peer to peer network connectivity protocol? <\/em><\/strong><a href=\"https:\/\/www.nkn.org\/\"><strong><em>Check out NKN <\/em><\/strong><\/a><strong><em>for more information<\/em><\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>How to Secure Remote Access<\/strong><\/h1>\n\n\n\n<p><a href=\"https:\/\/www.bishop-techs.com\/software\/remote-access-benefits-and-challenges\/\">Remote access<\/a> can be challenging to manage for any business that\u2019s only getting used to it for the first time or hasn\u2019t used it before. It\u2019s good to do the basics like <strong>generating strong passwords<\/strong> and making sure your staff are<strong> being vigilant <\/strong>and <strong>using common sense<\/strong> when it comes to dealing with <strong>suspicious-looking emails or browsing safely on the work computer<\/strong>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>&nbsp;Assume Hostile Threats Will Take Over<\/strong><\/h1>\n\n\n\n<p>Securing remote access can be done efficiently if you are always assuming that your company will be at risk of hostile threats over time. This means that you\u2019re <strong>always ready to take action<\/strong>, should it ever occur. With remote access, you <strong>can\u2019t rely on your own network security <\/strong>to provide the typical safety it brings at the workplace. <strong>There\u2019s more risk at home in terms of how secure the local wireless system<\/strong> is that the staff member is using.<\/p>\n\n\n\n<p>You might also want to <strong>consider any personal portable devices<\/strong> like <a href=\"https:\/\/www.nkn.org\/nMobile\/\">mobiles<\/a> that staff use for work because these can also become infected.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Develop Policy Defining Telework, Remote Access<\/strong><\/h1>\n\n\n\n<p>Another way of securing remote access is to <strong>develop a policy that defines telework when it comes to remote access<\/strong>. For example, this security policy might want to mention the types of devices that can be used for a particular way of working, whether it\u2019s an approved personal phone or a work laptop that you\u2019ve supplied to the staff member. The type of access they get might also be defined depending on who they are within the company.<\/p>\n\n\n\n<p>You might want to consider<strong> tiered levels of remote access <\/strong>depending on your company, and<a href=\"https:\/\/dataride.nkn.org\/\"> <strong>data sensitivity<\/strong><\/a><strong> <\/strong>is something to consider too.\u00a0<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Configure Remote Access Servers to Enforce Policies<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/9Rj0ekh_bOqog42awPwgTuRSzRPBz3utcgprfSmTRZTBKgJuxjEX1K88OQfEgPitgHk6hskdtmBrMFzPdsK9f3NHVUOPhszuh1dm83HhppdoZgwLdhR7HmPQ1FKTfj81gKt_zTTD\" alt=\"computer with lock\"\/><figcaption>computer with lock<\/figcaption><\/figure>\n\n\n\n<p>It\u2019s worth <strong>configuring your remote access<\/strong> to a single point, such as an agency\u2019s network perimeter, that ensures there\u2019s only <strong>one entry point for your network<\/strong>. Compromised servers can often be used to jump to and from other systems on the network, which is only going to cause more damage, and<a href=\"https:\/\/www.nkn.org\/\"> using NKN <\/a>can help ensure that these problems don\u2019t happen.<\/p>\n\n\n\n<p><strong><em>Related: <\/em><\/strong><a href=\"https:\/\/blog.nkn.org\/how-to-use-nsh-to-run-secure-remote-commands-on-ubuntu-18-04\/\"><strong><em>How To Use nsh to Run Secure Remote Commands On Ubuntu 18.04<\/em><\/strong><\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Secure Telework Client Devices Against Common Threats<\/strong><\/h1>\n\n\n\n<p>Remote devices like laptops and handhelds should have the same security control as company devices. Try to secure your own devices against common threats where possible. You should <strong>ensure personal <\/strong><a href=\"https:\/\/www.forbes.com\/sites\/insights-vmwaresecurity\/2019\/06\/13\/the-modern-firewall-reducing-the-attack-surface-securing-applications\/\"><strong>firewalls<\/strong><\/a><strong> can support multiple policies <\/strong>and configure it to <strong>work for both the workplace environment <\/strong>and the <strong>private environment of staff members.<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Employ Strong Encryption, User Authentication<\/strong><\/h1>\n\n\n\n<p>Encrypting data to protect the files you have on your clients and the<a href=\"https:\/\/blog.nkn.org\/nkn-sdk-powering-client-side-communication-without-servers\/\"> communications <\/a>you have between one another is crucial. It might also be worth putting in a <strong>two-step authentication process where the staff member has to verify themselves before gaining access.<\/strong> This can help ensure it\u2019s your staff member that\u2019s accessing the system and not some random hacker who got the information.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>What to Do if Malware is Already Discovered?<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/rahPNrWsmv4qV8nli-Cya5uBy9QxC3AFjnbevoK3qY451mSVEzYXQDh-wYkweEslUEqShlQ4CeBu0YMj0dkQeoG9gz1LOSCZMsAXO6du9VtExbyRsjx27B3aKDMY3aVmxRTukfx1\" alt=\"woman holding a lock\"\/><figcaption>woman holding a lock<\/figcaption><\/figure>\n\n\n\n<p>If malware has already been discovered, <strong>don\u2019t panic <\/strong>because you\u2019ll need to concentrate on managing the situation as quickly as possible.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scan Your Networking Using Your Antivirus System<\/h2>\n\n\n\n<p>Most systems that you have in place to act as a firewall for your network might have the programs in there to help remove the infection.<strong> Scan your network<\/strong> using this system and follow the instructions.<\/p>\n\n\n\n<p><strong><em>Looking for <\/em><\/strong><strong><em>secure, low cost, and universally accessible connectivity?<\/em><\/strong><a href=\"https:\/\/www.nkn.org\/\"><strong><em> Contact nkn today<\/em><\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disconnect The Infected Computer From Network<\/h2>\n\n\n\n<p>If the scan hasn\u2019t worked in terms of removing the infection, then it\u2019s time to<strong> disconnect the computer and any others that have been infected from the network.<\/strong> This will help <strong>prevent the spread of malware <\/strong>because everyone is using the same network. Once you\u2019ve disconnected it, you can then <strong>run the scans on the other computers to ensure it hasn\u2019t reached any other desktops<\/strong>. You should also avoid using the web at this point because that can give hackers access to the financial information that a staff member might have stored there.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let Your Tech Team Handle The Rest<\/h2>\n\n\n\n<p>Once you\u2019ve pinpointed all the infected hardware, it\u2019s now time to <strong>leave it to your tech team to handle the situation<\/strong>. They can go through the process of eliminating the infection while<strong> making sure to back up all the data on the computer and restoring it to its original function.<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h1>\n\n\n\n<p>Your remote access must be as secure as possible, so this might be a good time to <strong>invest in IT security<\/strong>, whether that\u2019s hiring someone with the experience like a security manager, or outsourcing it to a company.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.nkn.org\/\"><strong>NKN<\/strong><\/a><strong> <\/strong>motivates internet users to share network connections and utilize unused bandwidth. Their<strong> robust networking infrastructure enables application <\/strong><a href=\"https:\/\/www.nkn.org\/developer\/\"><strong>developers <\/strong><\/a><strong>to create a decentralized internet solution<\/strong> so that everyone can <strong>enjoy secure, accessible, and affordable connectivity.<\/strong><\/p>\n\n\n\n<p>That way, your employees can<strong> enjoy a safe and secure network connection<\/strong> for them to collaborate, share files, and to get the projects done on time all at the comfort of their own home.<\/p>\n\n\n\n<p><strong><em>Related:<\/em><\/strong><a href=\"https:\/\/blog.nkn.org\/encrypted-messaging-what-is-it-and-why-you-should-use-it-nkn\/\"><strong><em> Encrypted Messaging: What Is It and Why You Should Use It<\/em><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you trying to find a secure solution for your team to work remote? Here are 5 steps to secure remote access to help your employees keep their files and data safe.<\/p>\n","protected":false},"author":3,"featured_media":4520,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"mc4wp_mailchimp_campaign":[]},"categories":[253],"tags":[392,492,393],"acf":[],"_links":{"self":[{"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/posts\/7351"}],"collection":[{"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/comments?post=7351"}],"version-history":[{"count":1,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/posts\/7351\/revisions"}],"predecessor-version":[{"id":7355,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/posts\/7351\/revisions\/7355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/media\/4520"}],"wp:attachment":[{"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/media?parent=7351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/categories?post=7351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nkn.org\/zh-hans\/wp-json\/wp\/v2\/tags?post=7351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}