Working Remotely

Play episode

Show Notes:  Originally aired on June 16th, 2020

Today’s show will cover the subject of working remotely.  This is not an industry specific topic so please share with your friends and colleagues!

FSTEC – Are you going?  Any other restaurant industry-based conferences that you have heard of that are back on for this year?

Approaching working remotely from two different aspects:

As an employee – Equipment, etiquette, tools to make you more successful

–  As an IT professional responsible for the mobile workforce

Video Conferencing:

  • Mute yourself when not speaking.
  • Be on time.
  • Ensure your technology works correctly.
  • Wear work-appropriate clothing.
  • Frame the camera correctly.
  • Have the right light.
  • Look into the camera.
  • Pay attention.

Lume Lights for making you look better:

Remote Video Conferences Security

  • Password protect your meetings
  • Authenticate users
  • Join before host
  • Lock down your meeting
  • Use a randomly-generated id
  • Avoid file sharing
  • Check for updates

Great video conferencing software feature comparison chart on Wikipedia:

Security plan for an individual

  • Protect devices with an antivirus solution
  • Update programs and operating systems
  • Configure wi-fi encryption
  • Change your router login and password (no defaults)
  • Use a VPN service if connecting to a wi-fi network that doesn’t below to you
  • Lock your device before walking away
  • User corporate services for e-mail, messaging and all other work
  • Create strong passwords
  • Stay vigilant / email links, credentials, unusual requests.. double check everything
  • Keep your work separate from personal

General individual good practices

  • Track your progress – be ready to report on what you ‘ve done and how much time it took
  • Try to work normal office hours
  • Create a comfortable workspace – desk, well lit room, standing up, stretch your legs, drink water, get plenty of sleep and don’t skip meals.
  • Be transparent and communicate everything

For those that are running departments and responsible for your remote workers:

  • Make sure that staff know what to do if their device is lost or stolen. 
  • Work schedule policies and expectations must be communicated 
  • Encouraging Collaboration Keeps Teams Engaged

More to the techy side of the conversation

  •  infrastructure to the cloud
    • Servers
    • Azure / AWS
    • SaaS applications
    • Office365

Observed security activity: (covid-19 themed operations and schemes)

  • eCrime
  • Targeted intrusion
  • Targeting remote services, SaaS
  • Vishing Robocall and Tech support scams

General security tactics and solutions
Crowdstrike whitepaper:

  • Make sure you have a current cybersecurity policy that includes remote working. 
  • Sensitive data may be accessed through unsafe Wi-Fi networks. 
  • Plan for BYOD (bring your own device) devices connecting to your organization 
  • Personal devices will need to have the same level of security as a company-owned device
    • User MDM solution

Vulnerability management with a distributed workforce

  • Scanning remote systems
  • Agent based vulnerability assessment
  • Find a best in class endpoint protection and deep visibility into vulnerabilities

Patch management

  • Create a dedicated vulnerability management team
    • Deploy patch prioritization and automation tools

Securing remote workforces:

  • Reducing exposure with vulnerability risk management
  • Hardening remote user endpoints
  • Protect your collaboration platforms

How to contact me

  • Comment hotline: 954-302-0851
  • Website: (show notes will be posted here)
  • Twitter:
  • Facebook:
  • LinkedIn:
  • You can now subscribe to this podcast directly through your favorite podcast platform!
  • Next week’s show, we are going to talking with Danielle Guzzetta, Senior Vice President of Growth Hacking for Smokey Bones. 
Join the discussion

More from this show


Episode 2