Bloomberg Anywhere Remote Login Bloomberg Terminal Demo Request


Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.


Financial Products

Enterprise Products


Customer Support

  • Americas

    +1 212 318 2000

  • Europe, Middle East, & Africa

    +44 20 7330 7500

  • Asia Pacific

    +65 6212 1000


Industry Products

Media Services

Follow Us

Bloomberg Customers

Security Evaluation of Remote Users

Posted by: Rod Kurtz on December 15, 2009

Laptops are now the norm—making your risk of data loss significant even with the best of security intentions. Therefore, it makes sense to periodically review your security measures for remote users, taking steps to ensure that you are doing everything possible to secure your network from your greatest threat—your own users. Here are a few security measures to get you started:

1. Require that all remote users outside your perimeter firewall connect using a virtual private network.

2. Require all employees to use an antivirus solution on their laptop. This policy is easier to implement if you have issued company laptops. You should also maintain a written corporate policy that requires all remote users to verify that they are using AV/AS software on their personal hardware. Many AV vendors offer considerable discounts on software purchased through the employer for the home-user employee. Ask your AV vendor if it offers such a program.

3. Ensure that all laptops are regularly patched and updated. Many companies use patch and remediation software to ensure that their devices are frequently patched. In the long run, managed automation in the deployment of patches is really the best approach so you can carefully test patches before deployment.

4. Require that users change their passwords on a regular basis. We know it’s a tedious task, but it’s one step that will help increase your network’s level of security.

5. Create/maintain a remote-access usage policy and set clear expectations. The remote usage policy should outline patching expectations of personal hardware and specify applications that are off limits when connected to the network.

Jeff Hughes
Director of Solutions Marketing
Scottsdale, Ariz.

Reader Comments

VPN Haus

December 23, 2009 2:57 PM

Great advice. One to add--

Assure that users cannot change their firewall settings and VPN settings. This can be done with central managed configuration locks.

This is a great way to increase security measures.

Post a comment



Want to improve the way you run your business? Entrepreneurs, academics, and consultants from diverse industries offer practical advice on a variety of topics each business day.

To submit a tip for consideration, first check our archive of previous tips to make sure you're not repeating a tip someone has already contributed. Then send the tip to Small Business channel contributor Michelle Dammon Loyalka. Because of the volume of material she receives, she may not respond to each individual.

BW Mall - Sponsored Links

Buy a link now!