{"id":6347,"date":"2020-04-27T19:01:50","date_gmt":"2020-04-27T16:01:50","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=6347"},"modified":"2022-06-09T17:39:33","modified_gmt":"2022-06-09T14:39:33","slug":"remote-work","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/remote-work\/","title":{"rendered":"Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic"},"content":{"rendered":"\n<p>In this article, we&#8217;ve gathered everything you need to know about remote work. We share our own experiences and talk about how to organize remote access to company resources, how to protect the accounts of users who are working from home, what remote team working tools you can use for communicating and managing tasks, and how to keep in touch with your remote teams.<\/p>\n\n\n\n<p>Working remotely during the pandemic is not a mere trend. Today, with the number of people infected by the coronavirus that causes COVID-19 rising exponentially, and given that a cure or vaccine for the virus has yet to be discovered, the only means of fighting the epidemic is social distancing and learning how to work from home.<\/p>\n\n\n\n<p>Many countries have already implemented a quarantine. Airports, train stations, schools, restaurants, gyms, malls, beauty salons, and (in some cases) even parks and playgrounds have been closed. Concerts, lectures, and conferences have been postponed. In this situation, a majority of private and public entities have been forced to transition to having their employees work from home whenever feasible.<\/p>\n\n\n\n<p>We suggest that business owners view this transition to remote work as an opportunity to learn about new remote workplace software and optimize their resources. Facing an imminent economic crisis, we have to use all the means at our disposal to adapt to difficult market conditions and press onward.<\/p>\n\n\n\n<p>In this context, particular attention must be given to the topic of cyber security and risk management. Remote network connections are an additional avenue of attack for would-be intruders. We&#8217;ll tell you what you should be afraid of, what basic cybersecurity tips and rules you should implement for remote workers, and how to secure remote desktop connection to workplace computers.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter\"><center><a class=\"wp-block-button__link has-background\" style=\"background-color: #269400;\" href=\"https:\/\/www.protectimus.com\/winlogon\/?ref=remote-access-en-article\" target=\"_blank\" rel=\"noreferrer noopener\">Two-factor authentication for Windows and RDP<\/a><\/center><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Table of contents:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#Where do I start?\">Where do I start?<\/a><\/li><li><a href=\"#Setting up remote access\">Setting up remote access<\/a><ul><li><a href=\"#Connecting to a remote desktop over RDP\">Connecting to a remote desktop over RDP<\/a><\/li><li><a href=\"#Setting up two-factor authentication for VPN\">Setting up two-factor authentication for VPN<\/a><\/li><li><a href=\"#Setting up two-factor authentication for RDP\">Setting up two-factor authentication for RDP<\/a><\/li><\/ul><\/li><li><a href=\"#Essential tools for remote work\">Essential tools for remote work<\/a><ul><li><a href=\"#Cloud services for collaboration\">Cloud services for collaboration<\/a><\/li><li><a href=\"#Messaging apps\">Messaging apps<\/a><\/li><li><a href=\"#Task managers and CRM\">Task managers and CRM<\/a><\/li><li><a href=\"#Video calling, presentation, and conferencing tools\">Video calling, presentation, and conferencing tools<\/a><\/li><\/ul><\/li><li><a href=\"#IT security threats when working remotely\">IT security threats when working remotely<\/a><ul><li><a href=\"#Ways confidential information can be leaked\">Confidential information can be leaked<\/a><\/li><li><a href=\"#Ways malware can compromise corporate networks\">Malware can compromise corporate networks<\/a><\/li><li><a href=\"#Ways unauthorized users can gain access to company networks\">Unauthorized users can gain access to company networks<\/a><\/li><\/ul><\/li><li><a href=\"#Cybersecurity when working from home\">Cybersecurity when working from home<\/a><ul><li><a href=\"#Protecting remote connection\">Protecting remote connection<\/a><\/li><li><a href=\"#Two-factor authentication\">Two-factor authentication<\/a><\/li><li><a href=\"#Choosing OTP tokens\">Choosing OTP tokens<\/a><\/li><li><a href=\"#Security policies\">Security policies<\/a><\/li><\/ul><\/li><\/ul>\n\n\n\n<p><a name=\"Where do I start?\"><\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Where do I start?<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li>Think about <strong>the technology employees will use to work remotely.<\/strong> If people use company laptops, they can take these home with them during the quarantine. If employees use desktop computers, you&#8217;ll need to set up remote access to these computers.<\/li><li>Take care to <strong>protect remote connections and user accounts<\/strong> on company computers. Be sure that employees set <a href=\"https:\/\/www.protectimus.com\/blog\/how-to-choose-and-use-strong-passwords\/\">secure passwords<\/a> and activate two-factor authentication for all the services they use to do their work. <a href=\"#Setting up two-factor authentication for RDP\">Enable two-factor authentication for Windows and Microsoft RDP<\/a>.<\/li><li>Prepare a <strong>remote working software package<\/strong> for communicating, working with documents, tracking tasks, and holding presentations online. Most likely, you&#8217;re already using tools in most of these categories. If something is missing, you&#8217;ll need to choose team software and install it on all your employees&#8217; computers.<\/li><li>Maintain <strong>security policies <\/strong>for working from a computer at home. Hold mandatory training on the basics of IT security and come up with a remote work policy. Some of your employees may not know what <a href=\"https:\/\/www.protectimus.com\/blog\/phishing-vishing-smishing-pharming\/\">phishing<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/malvertising\/\">malvertising<\/a>, and <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a> are, why they shouldn&#8217;t connect to an unknown Wi-Fi network, and why they shouldn&#8217;t save usernames and passwords in a file on the desktop.<\/li><\/ol>\n\n\n\n<p><a name=\"Setting up remote access\"><\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Setting up remote access<\/strong><\/h2>\n\n\n\n<p>The remote access software available depends on the operating system installed on users&#8217; workstations.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Windows:<\/strong> If you use Windows, it&#8217;s best to organize remote desktop connection over the RDP (Remote Desktop Protocol). To do so, use the built-in Microsoft Remote Desktop program (available under Windows Professional, Enterprise, and Ultimate). If you use a different version of Windows, the best free remote desktop software for you is Microsoft Remote Assistance.<\/li><li><strong>macOS:<\/strong> Use the standard Screen Sharing application. You can also set up remote desktop connection for Mac using a third-party program or find out how to use Chrome Remote Desktop.<\/li><li><strong>Linux:<\/strong> Under Linux, as with any other operating system (<strong>Windows, macOS<\/strong>), third-party software for remote computer access, such as TeamViewer, AnyDesk, or Chrome Remote Desktop, will work.<\/li><li><strong>Large companies<\/strong> should also consider infrastructure solutions for remote work from Citrix, VMWare, and Cisco. In general, these solutions are expensive, but they guarantee the required level of remote desktop security.<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6372\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Chrome-Remote-Desktop.png\" alt=\"Remote work via Chrome Remote Desktop\" width=\"588\" height=\"442\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Chrome-Remote-Desktop.png 588w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Chrome-Remote-Desktop-300x226.png 300w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><a name=\"Connecting to a remote desktop over RDP\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Connecting to a remote desktop over RDP<\/h3>\n\n\n\n<p>During the 2020 quarantine brought about by the COVID-19 epidemic, a portion of the Protectimus team transitioned to working remotely. To do so, remote computer access was set up using the RDP client over a VPN. The VPN is used to access the corporate network, while RDP protocol is used to connect to a remote workstation. We also protect our employees&#8217; Windows user accounts with two-factor authentication for Windows remote desktop.<\/p>\n\n\n\n<p>This system of connecting to a remote workstation running Windows 7\/8\/10 makes it possible to maintain a well-secured connection. The VPN and RDP provide an encrypted connection, and thanks to the use of <a href=\"https:\/\/www.protectimus.com\/tokens\/\">two-factor authentication tokens<\/a>, we can be sure that it&#8217;s our employees accessing the PCs remotely, not an attacker. We recommend that you, too, configure remote access in a similar manner to ensure a remote desktop connection security. You can find out more about how to set up remote desktop access using a VPN and RDP <a href=\"https:\/\/5socks.net\/Manual\/what_is_rdp_vpn_eng.htm\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"here (opens in a new tab)\">here<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6350\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/rdp.png\" alt=\"Remote work over remote desktop connection\" width=\"418\" height=\"258\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/rdp.png 418w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/rdp-300x185.png 300w\" sizes=\"auto, (max-width: 418px) 100vw, 418px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Remote connection over RDP is available only for the Pro version of Windows and above. However, users can connect to a remote Windows desktop over RDP regardless of the operating systems they use on their home devices (Windows, macOS, and even Android and iOS). For Windows remote desktop connection from macOS, Android, or iOS, they&#8217;ll also need to install a free RDP client.<\/p>\n\n\n\n<p>To do work over the RDP, the server computer must be turned on. Once the user connects to the Windows remote desktop over RDP, the RDP server computer&#8217;s screen will be hidden until the end of the session.<\/p>\n\n\n\n<p>Connecting to a remote desktop Windows 10 \/ 8 \/ 7 makes it possible to use all of the remote computer&#8217;s resources and view the Windows 10 &nbsp;\/ 8 \/ 7 remote desktop just as if the user were working directly with that computer. Files can be transferred to the remote desktop using a shared clipboard, and local devices (such as printers, scanners, and hard disks) can be connected to the remote PC.<\/p>\n\n\n\n<p><a name=\"Setting up two-factor authentication for VPN\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Setting up two-factor authentication for VPN<\/h3>\n\n\n\n<p>If you use VPN clients (SonicWall, Sophos, Cisco, etc.) to secure your remote access, take care to additionally protect your VPN with two-factor authentication. <\/p>\n\n\n\n<p>It&#8217;s quite easy to integrate Protectimus two-factor authentication system with any VPN supporting RADIUS protocol. Read more about <a href=\"https:\/\/www.protectimus.com\/blog\/vpn-two-factor-authentication\/\">VPN two-factor authentication<\/a> and get in touch with our support team, who&#8217;ll be glad to assist you with adding 2-factor authentication to your corporate infrastructure even in real-time. <\/p>\n\n\n\n<p><a name=\"Setting up two-factor authentication for RDP\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Setting up two-factor authentication for RDP<\/h3>\n\n\n\n<p>The Protectimus Winlogon is a Windows and remote desktop two-factor authentication<strong> <\/strong>solution that enables you to set up two-factor authentication on computers running Windows operating systems, so you can protect Windows user accounts for both local access and remote access over RDP.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Windows two-factor authentication (2FA) setup | Secure Window login and RDP with MFA || Protectimus\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/xCeQ4jRzXo4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div class=\"schema-how-to wp-block-yoast-how-to-block\"><p class=\"schema-how-to-description\"><\/p> <ol class=\"schema-how-to-steps\"><li class=\"schema-how-to-step\" id=\"how-to-step-1587937413696\"><strong class=\"schema-how-to-step-name\"><strong>Download the Protectimus Winlogon installer.<\/strong><\/strong> <p class=\"schema-how-to-step-text\">Navigate to <a href=\"https:\/\/www.protectimus.com\/winlogon\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/www.protectimus.com\/winlogon\/<\/a> to download the Protectimus Winlogon installer and detailed solution setup instructions.<\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937435415\"><strong class=\"schema-how-to-step-name\"><strong>Register with the Protectimus SaaS service.<\/strong><\/strong> <p class=\"schema-how-to-step-text\">Follow this link to the <a href=\"https:\/\/service.protectimus.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus two-factor authentication cloud service<\/a> and sign up.<img decoding=\"async\" alt=\"\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Protectimus-2FA-service-registration.png\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937452770\"><strong class=\"schema-how-to-step-name\"><strong>Activate a service plan to activate the API.<\/strong><\/strong> <p class=\"schema-how-to-step-text\">Navigate to the <a href=\"https:\/\/service.protectimus.com\/en\/pricing\">Payment <\/a><a href=\"https:\/\/service.protectimus.com\/en\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"plans section and activate the plan that meets your needs. First, click  As (opens in a new tab)\">plans section and activate the plan that meets your needs. First, click  As<\/a>sign, and then, click Activate. The Free plan must also be activated.  After activating a plan, you&#8217;ll notice that the API status in the upper-right corner changes to active. <img decoding=\"async\" alt=\"Activate a service plan in Protectimus SaaS service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Activate-service-plan-in-Protectimus-service.png\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937470763\"><strong class=\"schema-how-to-step-name\"><strong>Create a resource.<\/strong>\u00a0<\/strong> <p class=\"schema-how-to-step-text\">Navigate to the <a href=\"https:\/\/service.protectimus.com\/en\/resources\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Resources<\/a> section. Click the Add Resource button, type a name for the resource, and set the other parameters as you like.<img decoding=\"async\" alt=\"Create a resource in Prptectimus Saas Service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Create-resource-in-Protectimus-SaaS-service.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937495126\"><strong class=\"schema-how-to-step-name\"><strong>Create users and tokens.<\/strong><\/strong> <p class=\"schema-how-to-step-text\">You can add <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/service.protectimus.com\/en\/users\" target=\"_blank\">users<\/a> and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/service.protectimus.com\/en\/tokens\" target=\"_blank\">tokens<\/a> manually (you can find more about creating tokens and users manually in the Protectimus Winlogon setup instructions, which you already downloaded), or you can activate automatic registration. If you use automatic registration, users will be able to create only Protectimus  Smart, Protectimus SMS, and Protectimus Mail tokens.<br\/><br\/>To activate automatic user and token registration, navigate to the <a href=\"https:\/\/service.protectimus.com\/en\/resources\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Resources<\/a> page. Click the name of the resource, select the Winlogon tab, and mark the following options:<br\/><br\/>\u2013 Access for unregistered users<br\/>\u2013 User auto-registration<br\/>\u2013 Token auto-registration<br\/>\u2013 Select token type users can create <br\/><br\/>After activating automatic registration, the first time users log into their accounts, they&#8217;ll enter their normal Windows usernames and passwords. Then, they&#8217;ll issue a token.<img decoding=\"async\" alt=\"Automatic user and token registration setup\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Protectimus-winlogon-automatic-user-and-token-registration.png\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937634167\"><strong class=\"schema-how-to-step-name\"><strong>Assign tokens to users.<\/strong><\/strong> <p class=\"schema-how-to-step-text\"><em>Skip this step if you activated automatic user and token registration!<br\/><br\/><\/em>Navigate to the <a href=\"https:\/\/service.protectimus.com\/en\/users\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Users<\/a> page and assign the tokens you just created to the corresponding users.  To do so, click Assign Token \u2014 Existing, select the token, and click  Assign.<img decoding=\"async\" alt=\"Assign tokens to users in Protectimus SAAS service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Assign-tokens-to-users-in-Protectimus-SAAS-service.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937651223\"><strong class=\"schema-how-to-step-name\"><strong>Assign tokens with users to a resource.<\/strong><\/strong> <p class=\"schema-how-to-step-text\"><em>Skip this step if you activated automatic user and token registration!<br\/><br\/><\/em>Navigate to the <a href=\"https:\/\/service.protectimus.com\/en\/resources\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Resources<\/a> page. Click Assign, choose &#8220;Token with user&#8221;, and select the tokens to assign to the resource.<img decoding=\"async\" alt=\"Assign tokens with users to a resource in Protectimus Saas service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Assign-tokens-with-users-to-a-resource-in-Protectimus-Saas-service.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937690052\"><strong class=\"schema-how-to-step-name\"><strong>Run the Protectimus Winlogon installer as an administrator on the computer that will receive RDP connections and install the software.<\/strong><\/strong> <p class=\"schema-how-to-step-text\">The installation process is intuitive. During one step of the process, you&#8217;ll need to specify the following parameters:<br\/><br\/>\u2013 <strong>API URL<\/strong>. Use the API URL <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/api.protectimus.com\/\" target=\"_blank\">https:\/\/api.protectimus.com\/<\/a>.<br\/>\u2013 <strong>API Login<\/strong>. This is the login you chose when registering with the service (that is, your email).<br\/>\u2013 <strong>API Key. <\/strong>You&#8217;ll need to copy your API key from the <a href=\"https:\/\/service.protectimus.com\/en\/profile\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Profile<\/a> page. To navigate to your user profile, click on your username in the upper-right corner of the interface. Then, choose &#8220;Profile&#8221; from the drop-down list.<br\/><br\/>You can find additional details in the Protectimus Winlogon setup instructions that you downloaded.<img decoding=\"async\" alt=\"Protectimus Winlogon setup\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Protectimus-Winlogon-setup.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1587937748645\"><strong class=\"schema-how-to-step-name\"><strong>Set up Windows remote desktop two-factor authentication.<\/strong><\/strong> <p class=\"schema-how-to-step-text\">Navigate to the <a href=\"https:\/\/service.protectimus.com\/en\/resources\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Resources<\/a> page, click the name of the resource, and select the Winlogon tab.<br\/><br\/>Turn on the &#8220;Access over RDP&#8221; setting. Turning on this setting allows accessing computers over RDP without two-factor authentication.<br\/><br\/>Turn on the &#8220;Apply 2FA for RDP&#8221; setting to enable two-factor authentication for RDP access requests.<img decoding=\"async\" alt=\"Windows remote desktop two factor authentication setup\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Windows-remote-desktop-two-factor-authentication-setup.png\"\/><\/p> <\/li><\/ol><\/div>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/active-directory-two-factor-authentication\/\">Active Directory Two-Factor Authentication<\/a><\/p>\n\n\n\n<p><a name=\"Essential tools for remote work\"><\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Essential tools for remote work<\/strong><\/h2>\n\n\n\n<p><a name=\"Cloud services for collaboration\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cloud services for remote work<\/h3>\n\n\n\n<p>Saving work-related files and folders on a home computer is inconvenient, besides, and it\u2019s an additional security risk. Cloud services like <a href=\"https:\/\/gsuite.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">G Suite<\/a> or <a href=\"https:\/\/www.office.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Office 365<\/a> are essential for working with documents. This is highly practical and important to protecting company data. It would be virtually impossible for our team to work remotely without Google Drive.<\/p>\n\n\n\n<p>G Suite and Office 365 offer a complete range of tools for collaborating on text documents, spreadsheets, and presentations. Files, folders, and documents are stored in the cloud, not on employees&#8217; home PCs. That means documents won&#8217;t ever get lost, you can access them from anywhere in the world, you&#8217;ll always have the latest version of every document, and any team member who has access can make changes or leave comments. Also included are tools for making video and audio calls, task managers, and calendars.<\/p>\n\n\n\n<p>Prohibit users from storing work documents on their home PCs in your remote work security policy. All files should be stored in the cloud, and users&#8217; G Suite or Office 365 accounts should be protected with two-factor authentication. Using hardware tokens for authentication provides the highest level of remote working cybersecurity. The <a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Slim NFC<\/a> can be connected to a <a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">Google account<\/a> or to <a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">Office 365<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6361\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Google-drive-1024x470.png\" alt=\"Google Drive - cloud service for remote work\" width=\"588\" height=\"270\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Google-drive-1024x470.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Google-drive-300x138.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Google-drive-768x352.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Google-drive-610x280.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Google-drive.png 1472w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/figure>\n<\/div>\n\n\n<p><a name=\"Messaging apps\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Messaging apps<\/h3>\n\n\n\n<p>You&#8217;ll need to choose a convenient messaging app (like <a href=\"https:\/\/telegram.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Telegram<\/a>, <a href=\"https:\/\/slack.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Slack<\/a>, <a href=\"https:\/\/discordapp.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Discord<\/a>, or <a href=\"https:\/\/www.skype.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Skype<\/a>) to communicate with your team. If you have a smaller team (up to 50 people), Telegram is a suitable choice. Larger companies prefer Slack. Most commonly, Skype and Zoom are used for video meetings.<\/p>\n\n\n\n<p>If you don&#8217;t want to use a third-party app to handle internal communication, consider <a href=\"https:\/\/rocket.chat\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Rocket.Chat<\/a>, an open source messaging app. It can be installed on your company server and it&#8217;s free. That way, all data exchanged by employees in chats will remain on company servers.<\/p>\n\n\n\n<p>Working from home requires each employee to have your chosen messaging app installed. Typically, a general chat for all employees is created to publish announcements, and smaller chats are created for each individual project, so people can discuss their ongoing tasks. Calls are better for resolving serious issues.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/trustworthy-messaging-apps\/\">Which messaging apps are trustworthy?<\/a><\/p>\n\n\n\n<p><a name=\"Task managers and CRM\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Task managers and CRM<\/h3>\n\n\n\n<p>You&#8217;ll need a task manager (like <a href=\"https:\/\/trello.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Trello<\/a>, <a href=\"https:\/\/asana.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Asana<\/a>, or <a href=\"https:\/\/www.atlassian.com\/software\/jira\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Jira<\/a>) to set tasks and monitor remote team working progress. To work efficiently with your customers, you&#8217;ll need a CRM (customer relationship management) system. Often, task managers and CRM systems are available in a single package (like <a href=\"https:\/\/www.zoho.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Zoho<\/a>, <a href=\"https:\/\/www.bitrix24.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Bitrix<\/a>, and Asana, mentioned before). Each task manager has its own strengths and is appropriate for different kinds of projects. For example, Jira is often used in the IT industry because it&#8217;s excellent for tracking development stages. Smaller companies often choose Trello because it&#8217;s a free task manager that&#8217;s also straightforward and convenient to use. Try a few options and choose the one that suits you best.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6363\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/task-managers.png\" alt=\"Task managers for remote work\" width=\"588\" height=\"236\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/task-managers.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/task-managers-300x120.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/task-managers-768x308.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/task-managers-610x245.png 610w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/figure>\n<\/div>\n\n\n<p><a name=\"Video calling, presentation, and conferencing tools\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Video calling, presentation, and conferencing tools<\/h3>\n\n\n\n<p>During the quarantine, all meetings and presentations have to be conducted online. Remote working also forces you to call your team to discuss important issues. It&#8217;s a good idea to enable your camera and learn how to share your screen for these calls. Be sure that your sales team is set up to use a variety of video calling tools, like <a href=\"https:\/\/www.skype.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Skype<\/a>, <a href=\"https:\/\/zoom.us\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Zoom<\/a>, <a href=\"https:\/\/hangouts.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Google Hangouts<\/a>, and <a href=\"https:\/\/www.gotomeeting.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">GoToMeeting<\/a>.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/9-gmail-security-rules\/\">9 Must-Follow Gmail Security Rules<\/a><\/p>\n\n\n\n<p><a name=\"IT security threats when working remotely\"><\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>IT security threats when working remotely<\/strong><\/h2>\n\n\n\n<p>Working from home involves an increased risk of company data leaks and provides attackers with additional opportunities to penetrate your company network. This is because it&#8217;s impossible to know how employees&#8217; computers are set up, how technically literate they are, and how many third parties (family members, friends, hackers) have access to these computers.<\/p>\n\n\n\n<p>For hackers, COVID-19 and the quarantines implemented by most countries around the world are a dream come true. During the quarantine, with almost every business forced to switch to online work, hackers will be focusing all their efforts on finding ways into poorly protected computers and networks. Hackers try to find the &#8220;weakest link&#8221;: whose computer has already been infected by a virus, who is using weak passwords, who isn&#8217;t protecting their accounts with two-factor authentication, and who clicks on links in phishing emails from unknown senders. All this is in order to compromise a user&#8217;s home computer and, through it, access a corporate network. Governments and financial institutions should be especially cautious, as well as big companies that save large amounts of data on their servers.<\/p>\n\n\n\n<p><a name=\"Ways confidential information can be leaked\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Confidential information can be leaked<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>An employee&#8217;s personal computer being used to access a Windows remote desktop may be infected by malware.<\/li><li>An employee may become the victim of a <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing<\/a> or <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-against-2fa\/\">social engineering<\/a> attack if they aren&#8217;t prepared and informed about these potential threats.<\/li><li>A user may lose a personal laptop or smartphone with an open remote desktop connection to Windows 7 \/ 8 \/ 10.&nbsp;<\/li><li>A device set up for a secure remote desktop connection, and which has usernames and passwords saved on it, may stop working and require repairs.<\/li><li>A single account on an employee&#8217;s home computer may be shared with all of the employee&#8217;s family members \/ friends \/ neighbors. There is a good chance that at least one of them will download a file containing a virus. It&#8217;s also impossible to exclude the possibility that one of these people would like to gain access to your company network.<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"490\" height=\"447\" class=\"wp-image-6364 aligncenter\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Bank-of-America-phishing-scam-example.jpg\" alt=\"Phishing attack example\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Bank-of-America-phishing-scam-example.jpg 490w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Bank-of-America-phishing-scam-example-300x274.jpg 300w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/figure>\n<\/div>\n\n\n<p><a name=\"Ways malware can compromise corporate networks\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malware can compromise corporate networks<\/h3>\n\n\n\n<p>If a computer used for remote work is infected by malware, then the entire corporate network could also be infected. The source of the virus might be a torrent download or a <a href=\"https:\/\/www.protectimus.com\/blog\/what-is-phishing-and-how-not-to-fall-into-its-nets\/\">phishing email<\/a>. However, the main reason such a threat can exist is a lack of antivirus software on users&#8217; computers.<\/p>\n\n\n\n<p><a name=\"Ways unauthorized users can gain access to company networks\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Unauthorized users can gain access to company networks<\/h3>\n\n\n\n<p>If a user has a <a href=\"https:\/\/www.protectimus.com\/blog\/the-worst-passwords-of-2015\/\">weak password<\/a> and doesn&#8217;t use two-factor authentication, there is an extremely high risk that the user&#8217;s account will be compromised. A home computer may be infected by malware capable of collecting or intercepting usernames and passwords. Additionally, someone else in the user&#8217;s environment may use their login details to gain access to the company&#8217;s internal infrastructure (we all know how usernames and passwords can be carelessly written on a piece of paper left near the computer or stored in a &#8220;passwords&#8221; file on the desktop).<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/ransomware-to-pay-or-not-to-pay\/\">Ransomware \u2013 to Pay or Not to Pay<\/a><\/p>\n\n\n\n<p><a name=\"Cybersecurity when working from home\"><\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Cybersecurity tips when working from home<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Encrypt network traffic for connections to remote workstations.<\/li><li>Use two-factor authentication when connecting to a remote desktop.&nbsp;<\/li><li>Inform employees of basic cybersecurity rules; ideally, incorporate your remote work from home policy into your standard contract as a separate section.<\/li><\/ul>\n\n\n\n<p><a name=\"Protecting remote connection\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protecting remote connection<\/h3>\n\n\n\n<p>When setting up remote access to computer over the internet, be sure the connection is secure. Use an encrypted VPN or set up another means of encrypting network traffic. For example, even if you use RDP directly, without a VPN, the Microsoft Remote Desktop app lets you configure additional encryption options and change the RDP port.<\/p>\n\n\n\n<p><a name=\"Two-factor authentication\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Two-factor authentication<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.protectimus.com\/blog\/how-does-2-factor-authentication-work\/\">2-factor authentication<\/a> should be activated for every service your employees use. It acts as a barrier that is almost impossible for attackers to penetrate.<\/p>\n\n\n\n<p>Two-factor authentication protects you from <a href=\"https:\/\/www.protectimus.com\/blog\/brute-force-attack\/\">brute-force attacks<\/a> and <a href=\"https:\/\/www.protectimus.com\/blog\/keylogger\/\">keyloggers<\/a>. It often saves accounts from being compromised after a successful phishing, social engineering, or <a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">man-in-the-middle attack<\/a>. It also prevents unauthorized access by other people with physical access to a computer, as well as by hackers that have obtained usernames and passwords in an attack.<\/p>\n\n\n\n<p>Be sure that two-factor authentication is set up for all critical nodes:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>First and foremost, set up two-factor authentication for remote desktop. If you use other tools to enable remote work, such as Citrix or VMWare products, <a href=\"https:\/\/www.protectimus.com\/radius\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">set up two-factor authentication via RADIUS<\/a>.<\/li><li>Encourage users to <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">install Protectimus Winlogon on their home computers<\/a> if they use Windows, or to enable the built-in two-factor authentication if they use macOS.&nbsp;<\/li><li>All employees should enable <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-in-cloud-security\/\">two-factor authentication for cloud services<\/a> the team will be using to collaborate on documents (Google, Office 365, etc.).&nbsp;<\/li><\/ol>\n\n\n\n<p>We recommend using <a href=\"https:\/\/www.protectimus.com\/blog\/hardware-or-software-token-which-one-to-choose\/\">hardware tokens<\/a> to generate one-time passwords.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6365\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Protectimus-Slim-NFC-hardware-token.jpg\" alt=\"Hardware OTP token Protectimus Slim NFC - perfect for remote work security\" width=\"610\" height=\"329\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Protectimus-Slim-NFC-hardware-token.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/04\/Protectimus-Slim-NFC-hardware-token-300x162.jpg 300w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n<\/div>\n\n\n<p><a name=\"Choosing OTP tokens\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Choosing OTP tokens for remote work<\/h3>\n\n\n\n<p>Order hardware tokens for all employees to use in generating one-time passwords. This is the most reliable means of two-factor authentication.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>For Windows and RDP authentication<\/strong> via Protectimus Winlogon, connect <a href=\"https:\/\/www.protectimus.com\/protectimus-two\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Two<\/a> hardware tokens. These are the most reliable, cost-effective tokens for this context. The <a href=\"https:\/\/www.protectimus.com\/protectimus-slim-mini\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Slim NFC<\/a> is also an excellent choice, but it is a more expensive token. If you have a limited budget, the <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Smart<\/a> 2FA app or <a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">messaging service chatbots<\/a> on Telegram, Viber, and Facebook Messenger also provide a good level of security. We recommend avoiding SMS authentication since it&#8217;s expensive and <a href=\"https:\/\/www.protectimus.com\/blog\/sms-authentication\/\">not secure<\/a>.<\/li><li><strong>For the G Suite and Office 365 cloud services, <\/strong>use Protectimus Slim NFC tokens, since only <a href=\"https:\/\/www.protectimus.com\/blog\/totp-tokens-protectimus-slim-nfc-faq\/\">programmable hardware tokens<\/a> can be connected to these services.<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n<table>\n<tbody>\n<tr>\n<td colspan=\"3\">\n<h4 style=\"text-align: center;\"><strong>Windows \u0438 RDP<\/strong><\/h4>\n<p style=\"text-align: center;\">(when using the Protectimus Winlogon solution)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100\" height=\"40\">\n<p><em><i>Recommended tokens<\/i><\/em><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"70\">\n<p><em><i>Level of protection<\/i><\/em><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"350\">\n<p><em><i>Token features<\/i><\/em><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/protectimus-two\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Two<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5955 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/TOTP-token-Protectimus-Two.jpg\" alt=\"Classic TOTP token Protectimus Two\" width=\"593\" height=\"310\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/TOTP-token-Protectimus-Two.jpg 593w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/TOTP-token-Protectimus-Two-300x157.jpg 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/p>\n<p><\/p>\n<\/td>\n<td style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6307\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png\" alt=\"*****\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/td>\n<td>\n<ul>\n<li>Key fob token.<\/li>\n<li>Not reprogrammable (secret key is hard-coded and cannot be changed).<\/li>\n<li>Shockproof.<\/li>\n<li>Waterproof.<\/li>\n<li>Battery life: 3-5 years.<\/li>\n<li>Price per unit: 11.99 USD.<\/li>\n<li>Warranty: 12 months.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Slim NFC<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5956 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC.jpg\" alt=\"Programmable OTP token Protectimus Slim NFC\" width=\"520\" height=\"347\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC.jpg 520w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-300x200.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-321x214.jpg 321w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-140x94.jpg 140w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6307\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png\" alt=\"*****\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/span><\/strong><\/td>\n<td>\n<ul>\n<li>Token with credit card form factor.<\/li>\n<li>Reprogrammable (can be connected to any service that supports 2FA apps; new secret keys can be programmed into the token over NFC [requires an Android smartphone]; secret key can be reprogrammed infinitely).<\/li>\n<li>Includes time synchronization feature.<\/li>\n<li>Waterproof.<\/li>\n<li>Battery life: 3-5 years.<\/li>\n<li>Price per unit: 29.99 USD.<\/li>\n<li>Warranty: 12 months.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/protectimus-smart\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Smart<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-569 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function.jpg\" alt=\"MFA authenticator Protectimus Smart OTP\" width=\"348\" height=\"348\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function.jpg 348w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-184x184.jpg 184w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6309\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png\" alt=\"***\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/td>\n<td>\n<ul>\n<li>App for generating one-time passwords.<\/li>\n<li>Additional protection via PIN code.<\/li>\n<li>Automatic clock synchronization.<\/li>\n<li>Multiple tokens can be created within a single app.<\/li>\n<li>If a user accidentally deleted the app, their tokens cannot be recovered.<\/li>\n<li>Available free of charge on iOS and Android.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/protectimus-bot\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Bot<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6303 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/Protectimus-bot-token.png\" alt=\"Protectimus Bot - OTP delivery bot in Telegram \/ Viber \/ Facebook Messenger\" width=\"173\" height=\"173\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/Protectimus-bot-token.png 173w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/Protectimus-bot-token-150x150.png 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/Protectimus-bot-token-160x160.png 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/Protectimus-bot-token-60x60.png 60w\" sizes=\"auto, (max-width: 173px) 100vw, 173px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6309\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png\" alt=\"***\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/td>\n<td>\n<ul>\n<li>One-time password delivery via Protectimus Bot chatbots on popular messaging services.<\/li>\n<li>Supported messaging apps: Telegram, Viber, Facebook Messenger.<\/li>\n<li>Users don&#8217;t need to install additional apps on their smartphones.<\/li>\n<li>Can also be configured to deliver notifications.<\/li>\n<li>Users cannot lose tokens and can always recover them.<\/li>\n<li>Tokens available free of charge.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">\n<h4 style=\"text-align: center;\"><strong>GSuite<\/strong><\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" height=\"40\">\n<p><em><i>Recommended tokens<\/i><\/em><\/p>\n<\/td>\n<td style=\"text-align: center;\">\n<p><em><i>Level of protection<\/i><\/em><\/p>\n<\/td>\n<td style=\"text-align: center;\">\n<p><em><i>Token features<\/i><\/em><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Slim NFC<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5956 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC.jpg\" alt=\"TOTP token Protectimus Slim NFC - the most reliable authenticator to protect the GSuite account you use for remote work\" width=\"520\" height=\"347\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC.jpg 520w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-300x200.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-321x214.jpg 321w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-140x94.jpg 140w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6307\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png\" alt=\"*****\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/span><\/strong><\/td>\n<td>\n<ul>\n<li>Token with credit card form factor.<\/li>\n<li>Reprogrammable (can be connected to any service that supports 2FA apps; new secret keys can be programmed into the token over NFC [requires an Android smartphone]; secret key can be reprogrammed infinitely).<\/li>\n<li>Includes time synchronization feature.<\/li>\n<li>Waterproof.<\/li>\n<li>Battery life: 3-5 years.<\/li>\n<li>Price per unit: 29.99 USD.<\/li>\n<li>Warranty: 12 months.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/protectimus-smart\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Smart<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-569 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function.jpg\" alt=\"2FA application Protectimus SMART can be also used to protect the GSuite account you use for remote work\" width=\"348\" height=\"348\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function.jpg 348w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-184x184.jpg 184w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6309\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png\" alt=\"***\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/span><\/strong><\/td>\n<td>\n<ul>\n<li>App for generating one-time passwords.<\/li>\n<li>Additional protection via PIN code.<\/li>\n<li>Automatic clock synchronization.<\/li>\n<li>Multiple tokens can be created within a single app.<\/li>\n<li>If a user accidentally deleted the app, their tokens cannot be recovered.<\/li>\n<li>Available free of charge on iOS and Android.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">\n<h4 style=\"text-align: center;\"><strong>Office 365<\/strong><\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><em><i>Recommended tokens<\/i><\/em><\/p>\n<\/td>\n<td style=\"text-align: center;\">\n<p><em><i>Level of protection<\/i><\/em><\/p>\n<\/td>\n<td style=\"text-align: center;\">\n<p><em><i>Token features<\/i><\/em><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Slim NFC<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5956 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC.jpg\" alt=\"Programmable TOTP token Protectimus Slim NFC - best protection for Office 365 account you use for remote work\" width=\"520\" height=\"347\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC.jpg 520w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-300x200.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-321x214.jpg 321w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/01\/Protectimus-Slim-NFC-140x94.jpg 140w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6307\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png\" alt=\"*****\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/5stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/span><\/strong><\/td>\n<td>\n<ul>\n<li>Token with credit card form factor.<\/li>\n<li>Reprogrammable (can be connected to any service that supports 2FA apps; new secret keys can be programmed into the token over NFC [requires an Android smartphone]; secret key can be reprogrammed infinitely).<\/li>\n<li>Includes time synchronization feature.<\/li>\n<li>Waterproof.<\/li>\n<li>Battery life: 3-5 years.<\/li>\n<li>Price per unit: 29.99 USD.<\/li>\n<li>Warranty: 12 months.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">\n<p><a href=\"https:\/\/www.protectimus.com\/protectimus-smart\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Smart<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-569 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function.jpg\" alt=\"You can also use 2FA app Protectimus SMART to protect the Office 365 account you use for remote work\" width=\"348\" height=\"348\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function.jpg 348w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/protectimus-token-with-cwys-function-184x184.jpg 184w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/p>\n<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6309\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png\" alt=\"***\" width=\"1400\" height=\"327\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars.png 1400w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-300x70.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-1024x239.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-768x179.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/03\/3stars-610x142.png 610w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/span><\/strong><\/td>\n<td>\n<ul>\n<li>App for generating one-time passwords.<\/li>\n<li>Additional protection via PIN code.<\/li>\n<li>Automatic clock synchronization.<\/li>\n<li>Multiple tokens can be created within a single app.<\/li>\n<li>If a user accidentally deleted the app, their tokens cannot be recovered.<\/li>\n<li>Available free of charge on iOS and Android.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<p><a name=\"Security policies\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security policies<\/h3>\n\n\n\n<p>Your duty is to clearly state your <a href=\"https:\/\/www.protectimus.com\/blog\/byod-security-rules\/\">IT security rules for remote work<\/a> and inform employees of them. Each member of the team needs to know how to act in order to minimize the risk of having their user account compromised.<\/p>\n\n\n\n<p>Your remote work policy template might look something like this:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>When finished working, do not forget to disconnect from the VPN and RDP.<\/li><li>Do not share login details and tokens with anyone.<\/li><li>Do not save login details on your computer or write them down anywhere.<\/li><li>Do not allow others to use your PC with the VPN and RDP connected.<\/li><li>Do not download data from work computers to your home PC. Perform all operations exclusively on a work PC, or on a collaborative cloud service when working with documents.&nbsp;<\/li><li>Enable two-factor authentication in Windows \/ G Suite \/ Office 365.<\/li><li>Be certain that your home PC is not infected by viruses. If you aren&#8217;t sure, download antivirus software and scan your system. If you still have doubts or questions after running a scan, contact the system administrator.&nbsp;<\/li><li>Do not open links in, or download files from, emails from unfamiliar senders.<\/li><\/ul>\n\n\n\n<p>Employees should follow basic security rules regardless of where they work, at home or at the office. For this reason, we recommend regularly holding IT security &#8220;master classes&#8221; and training sessions to teach employees to recognize phishing and social engineering, use passwords managers and two-factor authentication, change passwords every few months, and not reveal too much personal information on social networks.<\/p>\n\n\n\n<p>How long citizens will remain isolated is uncertain. Epidemiologists have made a variety of predictions. Some claim that the quarantine may be extended until next spring. You start transitioning your team to remote work as soon as you can, and we&#8217;ll help you take care of security. You can contact us with questions at any time by writing to  <a href=\"mailto:support@protectimus.com\">support@protectimus.com<\/a>.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus\/\">Duo Security vs Protectimus<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/protectimus-mfa-financial-services\/\">Best Protectimus MFA Features for Financial Services Cybersecurity<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/time-drift-in-totp-hardware-tokens\/\">Time Drift in TOTP Hardware Tokens Explained and Solved<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/keycloak-multi-factor-authentication-hardware-tokens\/\">Keycloak Multi-Factor Authentication With Hardware Tokens<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">10 Most Popular Two-Factor Authentication Apps Compared<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/2fa-security-flaws\/\">2FA Security Flaws You Should Know About<\/a><\/li><\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>In this article, we&#8217;ve gathered everything you need to know about remote work. We share our own experiences and talk about how to organize remote access to company resources, how to protect the accounts of users who are working from home, what remote team working tools you can use for communicating and managing tasks, and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6368,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7,9,15,329],"tags":[274,194,1081,1066,1080,139,99,436],"class_list":["post-6347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","category-protectimus-products","category-rd","category-setup-guides","tag-byod","tag-protectimus-en","tag-protectimus-winlogon","tag-rdp","tag-remote-work","tag-tokens","tag-two-factor-authentication","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=6347"}],"version-history":[{"count":27,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6347\/revisions"}],"predecessor-version":[{"id":7672,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6347\/revisions\/7672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/6368"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=6347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=6347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=6347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}