[email protected]
  • Home
  • Team
  • Events
    • MC2MC Live: The Matrix of Innovation (22/05/2025)
    • MC2MC Live: Voyage to the Edge of the Cloud (26/06/2025)
    • Past events gallery
  • Speakers
    • Call for Speakers
    • Speaker information
  • Photos
  • Contact
  • Sponsors
  • About
    • Code of Conduct
    • Privacy Policy

Top 10 security recommendations to consider while working at home!

Posted on April 18, 2020
  • Mobile working is a standard, today.
  • Companies are not longer protected by their infrastructure in their corp-environment.
  • Crucial data is moving away from centralized systems. We are taking document data out of our corporate environment to work on this data.
  • Does it sounds familiar?  

Over the last years I’ve met a lot of customers that were not capable of managing their devices. I’m not only talking about all workstations and portables. I’m talking about ALL devices that are accessing corporate data. successfully managing devices is important. Securing your identity is important. Everything is important. 

I’ve written a top 10 to tackle these challenges during teleworking or homeworking.

the 10 security recommendations we should consider while working from home!

  1. Identity Security / MFA
  2. Install the latest patches and updates
  3. Passwords and management
  4. Build real-time reports of security risks 
  5. Create automated and intelligent alerts 
  6. Install antivirus on all endpoints 
  7. Secure devices and corporate devices (+ personal phones) 
  8. Evaluate regularly which users have access to data, devices and networks 
  9. Track, change and block access for temporary projects and when employees are leaving your company 
  10. Use information protection solutions to protect your data everywhere. 

READ MORE HERE

Previous Post
MC2MC Kick-Off Evening slide decks and Sway
Next Post
Get device hashes from HP for Autopilot pre-production testing

Recent Posts

  • MC2MC Live: Jurassic Cloud Adventures (24/04/25) April 28, 2025
  • MC2MC Live: Cloudy with a Chance of Data (20/03/25) March 22, 2025
  • MC2MC Live: Forward to the Past (2024) December 23, 2024
  • MC2MC Live: The Cloud Strikes Back (2024) November 18, 2024
  • MC2MC Live: Safeguarding the Digital Frontier (2024) September 30, 2024

Categories

  • Autopilot (1)
  • Azure (29)
  • Azure AD (2)
  • Azure Virtual Desktop (2)
  • Big Data (1)
  • ConfigMgr (3)
  • Containers (2)
  • EMS (7)
  • GitHub (3)
  • Guides (6)
  • Hyper-V (1)
  • IaC (1)
  • Intune (20)
  • M365 (20)
  • MC2MC (39)
  • MC2MC Live (2)
  • MDATP (3)
  • PowerApps (3)
  • PowerAutomate (6)
  • PowerShell (4)
  • Security (10)
  • Veeam (1)
  • Visual Studio Code (1)
  • Viva (1)
  • Windows 10 (16)
  • Windows 11 (1)
  • Windows 365 (2)
  • Windows Autopilot (3)
  • Windows Server (1)
  • Windows Updates (1)
  • Windows365 (1)
  • Women In Tech (2)

RSS Jasper Bernaers

  • How a modern and secure workplace can help your organization become relevant
  • Actionable steps to decrease the risk of a Cyberattack
  • Cybersecurity in a remote connected world
  • Cybersecurity for local governments – in 10 steps

RSS Wim Matthyssen

  • Azure Arc: Keep your Azure Connected Machine agent up-to-date on a Windows Server
  • Azure Arc: Securely connect to an Azure Arc-enabled Windows Server with RDP over SSH
  • How to install OpenSSH on a Windows Server 2019/2022/2025 using a PowerShell script
  • PowerShell script: BgInfo deployment script for Windows Server 2025

RSS Tim De Keukelaere

  • How to configure RBAC permissions for available uninstall in Intune
  • WMUG NL Tuesdays – Latest and greatest in the world of Configuration Manager
  • Microsoft MVP 2020-2021 Award
  • A first look at the Configuration Manager Community Hub

RSS Micha Wets

  • AVD Client Cleanup script/tool
  • MSIX app attach Start Menu fixed in Windows Virtual Desktop
  • Windows Virtual Desktop Workshop December update
  • Windows Virtual Desktop Spring 2020 edition workshop

RSS Robbe Van den Daele

  • Detecting non-privileged Windows Hello abuse
  • MDE Device Discovery - Improving the monitored network page
  • Correlating Defender for Endpoint and Global Secure Access Logs
  • Parsing CEF messages without Azure Monitor Agent

© 2025 MC2MC vzw