FTC’s “Stick With Security” #6: Protect Remote Access To Your Network

Snell & Wilmer
Contact

On September 1, 2017, the FTC released its sixth “Stick with Security” principle, which highlighted the steps businesses can take to ensure that “outside entryways” into network systems are secure. Securing remote access to a network involves two aspects:

Ensure Endpoint Security

A company’s network is only as secure as the least safe device that connects to it. Before giving employees, clients, or service providers remote access, make sure to: set security ground rules, communicate those rules clearly, and verify compliance with them. Furthermore, off-site devices used for remote access should have updated software, patches, antivirus protections, and additional security measures to shield against threats. Such additional security measures could include a dynamic security code that must be entered to access the network. A company would also be wise to regularly reevaluate its requirements in the face of emerging threats and devices with outdated security.

Put Sensible Access Limits in Place

The FTC offers a few illustrative examples to explain its view concerning what qualifies as sensible access limits. In particular, it stresses limiting the scope and duration of remote access. For example, in the ordinary course of business, a retailer may give a contractor remote access to portions of the network system that are needed to complete the contractor’s task, but should restrict access to other parts of the system. Further, when the contractor’s work is completed, the requisite authorization should be discontinued. Lastly, if a contractor or vendor needs multiple employees to share remote administrative access, the retailer or company should have methods to audit and attribute account use to a particular employee.

Written by:

Snell & Wilmer
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Snell & Wilmer on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide