Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

CI Security Releases WFH Security Policy Assessment to AID Organizations in Managing Risk

Managed Detection and Response Provider Enhances the Ability for Organizations to Assess Remote Work Environments and Create Necessary Policies

CI Security, a Managed Detection and Response (MDR) services provider specializing in defending the networks of organizations and critical infrastructure, announced the addition of a W************* Security Policy Assessment to the company’s managed services offering.

Many workers are conducting business out of their home offices right now, some for the first time in their careers. IT leaders with remote users and home office cybersecurity risks have a solution with CI Security to improve remote worker environments.

The W************* Security Policy Assessment provides a comprehensive view of the risks faced by an organization and its remote workforce, the capabilities of the organization to implement appropriate and effective security controls, including how to monitor an expanded, and in many cases unmanaged, set of endpoints.

Recommended AI News: Security And Risk Management Trends For 2020

In response to state and local governments, hospitals, banks and other critical infrastructure entities moving to remote work, CI Security scales the W************* Security Policy Assessment to meet an organization’s immediate need to ensure the recent move to a remote workforce is as secure as possible. CI Security can additionally construct a permanent zero-trust remote workforce security program.

Related Posts
1 of 40,645

The result of the assessment is a W************* Security Policy Assessment report that documents the remote work methods in use across the remote organization, the current organizational capabilities to secure the remote workforce, and a set of recommended controls deemed appropriate to meet customer risk management objectives and resource constraints.

Recommended AI News: AiThority Interview with Jeff Elton, CEO at Concerto HealthAI

“Organizations globally are responsible for a multitude of considerations when keeping their employees healthy and safe during this global pandemic, including a remote workforce that is secure,” said Fred Langston CISSP CCSK, EVP Professional Services of CI Security. “The Remote Workforce Security Assessment aligns with CI Security’s mission to deliver solutions for organizations that enable them to provide a seamless transition from office to remote work locations like spare bedrooms while maintaining an appropriate level of security throughout the transition and beyond.”

Mike Hamilton, the company’s co-founder and CISO, said, “Quickly deployed solutions for remote access are already being used as an attack vector. Some organizations are using Remote Desktop Protocol (RDP) over the Internet, from employee home computers that are not managed or monitored. We need to right this ship right now, because no one wants a ransomware event on top of a pandemic lockdown. Zero-trust will be the new normal.”

The W************* Security Policy Assessment includes the following services:

  • Assess an organization’s policies, processes, training, and capabilities to secure the remote workforce
  • Assess controls in place or controls that can be imposed on the remote workforce to minimize risk while continuing productivity
  • Assess the capability of an organization’s remote workforce to comply with remote workforce security controls
  • Assess the ability of an organization to secure remote work environments for extended periods
  • Document all methods of remote work connectivity to office networks, computing requirements, cloud-based infrastructure, web applications, laptops, smartphones, and tablets

Recommended AI News: AiThority Interview with Jeff Elton, CEO at Concerto HealthAI

Comments are closed, but trackbacks and pingbacks are open.