Uploaded by Robert Hsia

To address the cybersecurity issues associated with remote office work

advertisement
To address the cybersecurity issues associated with remote
office work, what measures can be taken to reduce risks?
1. Users' computers should utilize the latest version of the operating system (OS) and
the latest antivirus software.
2. If using a VPN, enable multi-factor authentication.
3. After establishing a VPN connection, adhere to the principle of least privilege,
allowing only the necessary access permissions for users (e.g., network segments,
resources).
4. Keep the VPN server or firewall up to date to prevent malicious individuals from
exploiting vulnerabilities.
5. All VPN connections should retain logs of the connections.
Cybersecurity of IT
A. Development
1. The design of the development process must take into account cybersecurity
(security system architecture design).
Function and system designs prior to development should consider common aspects
such as "access control" and "secret management."
For example, in the case of a web server, frontend developers should use
vulnerability scanning tools to identify potential SQL injection and cross-site scripting
vulnerabilities during testing, and then address them.
To integrate cybersecurity into regular functionality, we can continuously provide
cybersecurity sharing and training to employees, or promote it from top to bottom
and from inside out. This ensures that engineers of various products are aware of
considering basic cybersecurity, allowing cybersecurity personnel to focus more on
the core architecture's security.
B. Operations
1. Only enable necessary services and grant the minimum required permissions.
2. Websites should use HTTPS.
3. Servers should have antivirus software installed, and firewalls should have IPS
(Intrusion Prevention System) enabled.
4. Web servers should have a Web Application Firewall (WAF) to inspect application
layer network traffic.
5. Cloud services should use a Content Delivery Network (CDN) to hide the actual IP
address and reduce the risk of DDoS attacks.
C. Audit and Verification
Internally, use vulnerability scanning tools to examine the entire system architecture
for vulnerabilities or risks.
Externally, penetration testing is required to verify if the system has potential
vulnerabilities from an external perspective and to ensure the effectiveness of the
defense systems.
Download