Work Remotely & Securely

Enable Business Applications Access Remotely

Cloudify.Asia helps you to enable work remotely through technology, policy, best practices and security

The outbreak of COVID-19 has caused more than 60,000 deaths and more than a million infected. Asia Pacific airlines alone record USD $278B revenue loss during this unprecented time. Most countries which include Malaysia and Singapore also announce lock-down which has caused negative business impact.

Can your staffs work remotely anywhere, anytime with any devices? How can you ensure security in place if only using only SSL VPN or Mobile VPN? Are you worries about the increasing attack of ransomware?

1. Roadmap for Effective Work Remotely

  • Evaluate the workflow for working remotely in your company
  • Find out what needs to be done with full flexibility conditions
  • Ready infrastructure either on-premises or local cloud
  • Identify devices that can access the network remotely & securely
  • Check if the bandwidth or firewall capacity are enough

  • Identify users access control to right resources at the right times for the right requirements
  • Move the creative process/workloads to the local cloud for faster and stable access to avoid frustrated users
  • Recommend easy to use remote infra with virtual-app than full VDI
  • Balance the required compute resources by setting up daily check points
  • Create online learning for your team to increase the productivity

2. Aligned Policies and Access Controls

3. Uninterrupted Team Communication

  • Hold virtual meetings regularly via Microsoft Team (Free or Paid version)
  • Manage your projects and resources daily via planner
  • Advise your team to allocate a dedicated work area
  • Re-evaluate the team working hours for Work & Life Balanace
  • Actively care for each others fromtime to time through prayers and calls
  • Enable daily huddle or short meeting to spread and share positivity, idea & coaching

  • Secure proxy remote access in place
  • Have ATP protection against malware & ransomware attack remotely
  • Monitor threat actively by using cloud monitor tools
  • Implement Security Assessment policy
  • Create fake phishing threats to identify risky user and provide online security awareness to them

4. Prevent Threat And Enforce Security

5. Adapt New Environment Well

  • Ensure the vendors & IT team able to adapt the entirely new working environment
  • Train IT personnel to be equipped to help and resolve issues remotely
  • Provide guidance and encourage remote users to take time off for families
  • Helping remote user adjust new work conditions
  • Break work schedule into 30-min intense block(s) with 5-min breaks in between