The cybersecurity concerns of having a remote workforce

... and the steps to mitigate the risks

Companies are now facing uncharted territories and sending their workforce to work from home. While scrambling to get everyone what they need to perform their duties, a lack of planning and rushed decisions compromise the efforts to secure the organization–and its devices, data, and employees. 

  • What devices are employees using to perform their work duties–personal or corporate? 

Winner of U.S. Cyber Command insider threat simulation facing industry-leading DLP, EDR, UBA, and SIEM vendors

National Insider Threat Task Force (NITTF) certified for User Activity Monitoring (CNSSD 504)

Secure customers in Scandinavia, U.K., and U.S. 

For more information

 jazznetworks.com  |  contact@jazznetworks.com

Your security webinar


Register to see the recording.

On-demand webinar

Discover remote work solutions for IT professionals.

Recorded: April 8th, 2020
Duration: 30 minutes

Jeff Roy, CISSP

VP of Global Sales Engineering

Jeff Roy is the VP of Sales Engineering for Jazz Networks, where he leads a global team bringing a world-class cyber analytics platform to the market. Over the past 20 years, he has helped a wide range of customers address various networking and security challenges. His latest passion is working with customers to protect from the Insider Threat. Jeff is a graduate of Northeastern University and holds a CISSP certification.

George Martinez

Systems Engineer

George Martinez has 16 years of experience in the Encrypted Communications field, holding roles within Systems Engineering and IT. He started his career managing Government Classified voice networks, expanding into the world of Unified Communications and now focuses on cybersecurity at Jazz Networks.

The engineers' view is presented by:

If you have these concerns, join us to learn about:

  • Visibility of remote laptops to help in operational effectiveness.
  • What applications, software, and OS' are running–are they unpatched, unsupported, or outdated?
  • How do employees get access to on-premise resources? 
  • Who is accessing your corporate devices–are they being shared by kids or others in the household? 
  • What is happening to the organization's data–is it downloaded (and stored) to personal devices or sent to private e-mail addresses?
  • What applications are in use–is the 'remote worker' situation starting shadow IT practices?  
  • Are employees vigilant for phishing attempts? 
  • What network-security practices are in place–and are employees using VPN as instructed? 
  • Are employees using password managers and 2FA? 
  • Policies that can be effective in keeping people safe.
  • Keeping sensitive documents safe with remote folks and cloud services.
  • Beware of COVID-related phishing/malware.
  • Q&A 
  • Live demo