Cybersecurity and Remote Work

Best Practices

1

Remote Access Security Best Practices

The global scramble to establish remote working is creating an unprecedented opportunity for cybercriminals. Follow our guidelines for making your remote setup as secure as possible and mitigating the risk of your widened attack surface.

Audit Policy Best Practices

With so many employees working from home, it's crucial to establish an effective audit policy to maintain the security of your IT environment. By following these best practices, you'll be able to spot potential security problems and ensure user accountability.

2

2

Active Directory Group Management Best Practices


During this massive shift to remote working policies, making use of AD groups is the best way to control access to your organization’s resources and enforce a least-privilege model. Get this guide to learn how to properly manage AD distribution and security groups.

3

Password Policy Best Practices

As work from home policies take effect, the attack surface of your organization grows. A strong password policy is the front line of defense for your organization's sensitive data.

Follow these best practices for AD password policy settings to strengthen the security of your IT environment.

4

NTFS Permissions Management Best Practices


Allowing a massive number of employees to work remotely widens an organization's attack surface, creating an increased need to control who can access your data. This guide explains how to properly configure and manage NTFS permissions to control access to files, folders, containers and objects on the network.

5

How to Prevent Ransomware Infections: Best Practices


With the recent shift to remote working, employees now receive an unprecedented amount of emails and online requests. Already, this increase in communication has facilitated a rise in ransomware attacks. These best practices will help you minimize the risk of infection and limit the damage that a successful attack can do.

6

User Behavior Analytics Best Practices

Having a sizable amount of employees working remotely presents numerous problems in managing cybersecurity.

This guide helps you stay aware of what your users have been up to and spot any deviations from their usual behavior quickly enough to prevent real damage.

7



Work remotely and stay secure! An expanding workplace brings with it a certain level of cyber risk and complexity. Safeguard your data by implementing these best practices for Data Access Governance. 

Data Access Governance Best Practices

8

©2020 Netwrix Corporation

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618

+33 9 75 18 11 19

Cybersecurity and Remote Work Best Practices

As work from home policies take effect, many cybersecurity challenges arise. These Best Practices help you make sure you strengthen the security of your IT environment, safeguard your data and are prepared to spot potential security threats.

Audit Policy Best Practices

1

Active Directory Group Management Best Practices

2

3

Password Policy Best Practices

4

NTFS Permissions Management Best Practices

5

How to Prevent Ransomware Infections: Best Practices

6

User Behavior Analytics Best Practicess

Data Access Governance

Best Practice

7

©2020 Netwrix Corporation

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618