Procedures & Guidelines - Remote Access
Section outline
-
It is the responsibility of all the Company employees with remote access privileges to the company network, to ensure that their remote access connection is given the same consideration as the user's on-site connection to the Company. The Companies Remote Access & BYOD course for protocols and more information can be accessed through one of the courses.
Secure remote access must be strictly controlled
Control will be enforced via one-time password authentication or public/private keys with strong passphrases
At no time, should any of the Company employees provide their login or email password to anyone else
The Company employees with remote access privileges must ensure that their company-owned or personal computer or workstation, which is remotely connected to the company network, is not connected to any other network at the same time, except for personal networks that are under complete control of the user.
All hosts that are connected to the Company's internal network via remote access must use the most up-to-date anti-virus and malware software and approved firewalls