Remote Workstation Security
Total Computer Solutions (TCS) recommends a layered approach to remote workstation security. We consider a device secure if it has been patched with the latest Microsoft security updates, it has an up to date anti-malware software installed, and there are limits to where that user can browse on the Internet.
When a workstation is physically in your building, the expectation is that nobody is going to pick it up and walk out with it. If the device is a laptop, tablet, or another portable type, then this becomes more complicated. Some things can be done to a mobile device to encrypt the drive so that if it is lost or stolen, the drive’s data is not accessible, and the ability to connect into your network is eliminated.
Remote workstations may never physically connect to your network, so confirming that they are receiving security updates and the virus software works correctly is difficult. If the device is lost or stolen, you need to wipe the computer hard drive so no one can access the data on the drive.
If you are required by the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes, or National Institute of Standards in Technology (NIST) to secure your data, the situation is even more critical, and TCS would recommend that you encrypt all hard drives that portable even if they don’t typically leave the facility. Having to notify clients that you have had a security breach is never pleasant, and it can be costly with fines and other penalties.
You might be a viable candidate for a remote workstation security solution if you have many small offices, a remote workforce, or have large quantities of portable devices that leave the office.
For a free no-obligation consult on remote workstation security, call TCS today 336-804-8449 or fill out a form below to be contacted by one of our representatives.