Loading Episode...
The Tech Chef - Skip Kimpel EPISODE 2, 16th June 2020
TCP002 : Working Remotely
00:00:00 00:42:13

TCP002 : Working Remotely

Show Notes:       

Today’s show will cover the subject of working remotely.  This is not an industry specific topic so please share with your friends and colleagues!

CONFERENCES

FSTEC – Are you going?  Any other restaurant industry-based conferences that you have heard of that are back on for this year?

Approaching working remotely from two different aspects:

-  As an employee – Equipment, etiquette, tools to make you more successful

-  As an IT professional responsible for the mobile workforce

Video Conferencing:

Etiquette 

-       Mute yourself when not speaking.

-       Be on time.

-       Ensure your technology works correctly.

-       Wear work-appropriate clothing.

-       Frame the camera correctly.

-       Have the right light.

-       Look into the camera.

-       Pay attention.

Lume Lights for making you look better:

https://lumecube.com/collections/computer-lighting/products/video-conference-lighting-kit-for-remote-workers


Green Screen

Chair Mounted Green Screen

https://myproductiveplace.com/products/green-screen?variant=31836103704627&utm_medium=cpc&utm_source=google&utm_campaign=Google%20Shopping&gclid=CjwKCAjwlZf3BRABEiwA8Q0qq-R0yH27FZmnchdOD8DSDGDDPBjJvIzP8NcDPQQd2mytVN9KLlnX-BoCzekQAvD_BwE


Promaster 6x7 Pop-up Background Green/Blue

https://www.amazon.com/Promaster-Pop-up-Background-Green-Blue/dp/B002BTTTYQ


Remote Video Conferences Security

-       Password protect your meetings

-       Authenticate users

-       Join before host

-       Lock down your meeting

-       Use a randomly-generated id

-       Avoid file sharing

-       Check for updates


Great video conferencing software feature comparison chart on Wikipedia: https://en.wikipedia.org/wiki/Comparison_of_web_conferencing_software


Security plan for an individual

-       Protect devices with an antivirus solution

-       Update programs and operating systems

-       Configure wi-fi encryption

-       Change your router login and password (no defaults)

-       Use a VPN service if connecting to a wi-fi network that doesn’t below to you

o  Express VPN: https://www.expressvpn.com

o  SufShark:  https://surfshark.com

-       Lock your device before walking away

-       User corporate services for e-mail, messaging and all other work

-       Create strong passwords

-       Stay vigilant / email links, credentials, unusual requests.. double check everything

-       Keep your work separate from personal


General individual good practices

-       Track your progress – be ready to report on what you ‘ve done and how much time it took

-       Try to work normal office hours

-       Create a comfortable workspace – desk, well lit room, standing up, stretch your legs, drink water, get plenty of sleep and don’t skip meals.

-       Be transparent and communicate everything


For those that are running departments and responsible for your remote workers:

-       Make sure that staff know what to do if their device is lost or stolen. 

-       Work schedule policies and expectations must be communicated 

-       Encouraging Collaboration Keeps Teams Engaged


More to the techy side of the conversation

Making the appropriate tools available for users

-        infrastructure to the cloud

o  Servers

o  Azure / AWS

o  SaaS applications

o  Office365




SECURITY

Observed security activity: (covid-19 themed operations and schemes)

-       eCrime

-       Targeted intrusion

-       Targeting remote services, SaaS

-       Vishing Robocall and Tech support scams


General security tactics and solutions

Crowdstrike whitepaper: https://go.crowdstrike.com/rs/281-OBQ-266/images/eBookCybersecurityCOVID-19.pdf


-       Make sure you have a current cybersecurity policy that includes remote working. 

-       Sensitive data may be accessed through unsafe Wi-Fi networks. 

-       Plan for BYOD (bring your own device) devices connecting to your organization 

-       Personal devices will need to have the same level of security as a company-owned device

o  User MDM solution


Vulnerability management with a distributed workforce

-       Scanning remote systems

-       Agent based vulnerability assessment

-       Find a best in class endpoint protection and deep visibility into vulnerabilities


Patch management

o  Create a dedicated vulnerability management team

o  Deploy patch prioritization and automation tools


Securing remote workforces:

-       Reducing exposure with vulnerability risk management

-       Hardening remote user endpoints

-       Protect your collaboration platforms



In closing:


That is a lot of content to take in in such a short amount of time!


How to contact me

-       Comment hotline: 954-302-0851

-       Website: https://SkipKimpel.com (show notes will be posted here)

-       Twitter: https://twitter.com/skipkimpel

-       Facebook:  https://www.facebook.com/skipkimpel1/

-       LinkedIn: https://www.linkedin.com/in/skipkimpel/


-       You can now subscribe to this podcast directly through your favorite podcast platform!


-       Next week’s show, we are going to talking with Danielle Guzzetta, Senior Vice President of Growth Hacking for Smokey Bones.