However even the most prepared organisations hit some roadblocks most notably around bandwidth and latency in and out of their datacentres resulting in email signatures from IT teams being co-opted to share the message ‘don’t use the VPN unless you have to’.
‘Please do not use the VPN if you only want to use Microsoft Teams’
‘For the best experience disconnect from the VPN before joining a Zoom call’
Administrators should also be mindful of maintaining their activity and audit logs with the sad fact that we are only seeing the tip of the iceberg for COVID-19 related data breaches. By centralising logs from a variety of systems the activities of threat actors can be identified post breach making it significantly easier to prevent the same attack again in the future.
Today we ask
If the same situation (perhaps not even caused by a pandemic) arise again how would you act differently?
What applications were the most challenging to deliver over remote working services?
If you have adopted new SaaS services what do you have in place to protect the identities that are used to access these services?
As a business we are committed to providing help, guidance and support to our customers, particularly those on the front line and in critical industries. We want to do our part to help, so if you have questions, want to chat some things through, you know where we are.