Managing IT Risk During the COVID Crisis

Managing Your IT Risk During the COVID-19 Crisis

The COVID-19 pandemic has companies searching for alternative ways to conduct business. In light of CDC recommendations to practice social distancing, organizations are relying heavily on online conferencing platforms and telecommuting to sustain operations and support their customers. Implementation of these solutions is fairly simple. Even companies with limited resources can implement a “Bring Your Own Device” (BYOD) Policy and eliminate the need to purchase new equipment. However, businesses need to address the security risks associated with adding employees’ personal devices to their IT infrastructure.

Personal devices may be infected or compromised and could bypass security controls and/or disable security counter measures. Additionally, allowing employees or contractors to save company data on personal devices relinquishes data control/protections. Finally, teleconferencing increases opportunities for bad actors to intercept/eavesdrop on poorly configured computer systems and software applications. Although these risks exist, they can be mitigated by implementing cybersecurity countermeasure’s like Virtual Private Network (VPN) and Mobile Device Management (MDM) solutions.

A VPN solution establishes an encrypted communication channel between off-premise devices (e.g., laptop, tablet, mobile phone, etc.) and the corporate network. This is critical when employees are connecting to the corporate network from open or unsecured wireless networks. Using a VPN, employees can securely  connect to digital resources and can prevent disclosure of private information.

MDM solutions provide companies with several ways to mitigate potential threats associated with use of personal devices to connect to corporate networks. These solutions include several features, including:

  • Device compliance to ensure devices adhere to corporate policies related to:
    • Anti-Virus
    • Malware protection
    • System and software patches
  • Device management to enforce security on personal device, including:
    • Password management
    • Device authentication
  • Data Protection features that:
    • Enforce data storage restrictions
    • Allow remote data wiping to ensure data is not stored on personal devices
    • Applies encryption to company data

Implementation of these types of solutions allows companies to address risk associated with BYOD policies without sacrificing security.

For additional guidance on risk mitigation strategies, please connect with a member of MFA’s IT Advisory Team.

MFA's COVID-19 Resource Center

Related posts
Sales/Use Tax and e-Commerce

Sales and Use Tax & Value Added Tax Pitfalls for e-Commerce Businesses

When selling online to customers within the U.S. and internationally, e-commerce businesses should consider several…

Read More
PPP Tax Deductibility

IRS Clarifies Tax Deductibility of PPP Expenses

The IRS and Treasury issued an update clarifying the tax deductibility of expenses related to…

Read More