Endpoint Security Health Check

don't leave it too late to secure your endpoints

Following the rush to deliver home working to huge swathes of the working population; now would be a good time to ensure that, not only are you using the most practical solution for remote access, but also that you are doing so in the most secure way.

Why now?  Well, there are four broad ways that you might have provided remote access:

  • VPN Only (for file and/or email access)
  • Remote Desktop (e.g. Microsoft Remote Desktop Services)
  • Online Productivity Tools (e.g. Microsoft Teams)
  • Remote Control (e.g. Splashtop or GoToMyPC)

Each of these presents a different set of potential challenges; and, if you’ve adopted more than one of the above, your problems are potentially worse.

Of primary concern is the matter of Data Loss Prevention (DLP).  As users adapt to home working it can be very easy for them to breach procedures and to store sensitive information on their local devices.  To make matters worse, criminals are now using the outbreak to exploit home workers.

At the heart of the issue lies the matter of device and user policies.  Previously these were enforced (or made irrelevant) by your centralised IT systems; however, home working may have created significant loop holes in your enforcement regime.


Our Endpoint Security Health Check is a service designed to address the specific demands of the current situation by providing:

  1.     An initial review of your current (i.e. desired policies) with one of your business or IT decision makers.
  2.     We connect remotely to each of your home workers’ devices and conduct a thorough check of their configuration against your desired state; carrying out initial remediation where possible.
  3.     We deliver a detailed report of the desired state, the before and after device state, and a set of remediation activities required to achieve your desired security state.

Regardless of your home working access method, our consultants’ checks will include:

  • Local firewall status (i.e. engaged and up to date)
  • Windows updates status
  • Connectivity security status (e.g. vpn configuration)
  • Local connectivity security (e.g. unsecured wi-fi access)
  • Document access privileges
  • Local storage privileges (e.g. usb drives, local disk drive)
  • Printing policies
  • Offline document storage policies (e.g. only save to shared online storage)
  • Local backups if offline document storage is allowed
  • Presence of non-authorised cloud sharing technologies (e.g. DropBox)
  • Use of personal email
  • Mobile Device configuration (e.g. smart phones and tablets)

To find out how we can help you to restore confidence in your email’s security, why not get in touch?

Working Together in These Uncertain Times

We’re in this together, and we’re in it for the long haul.

If you’d like to hear how we’re helping our clients to keep the lights on please click here.

To hear more about our specific COVID-19 measure you can click here.

Stay Safe and Stay In Touch!

Continue exploring...