Working Remotely

A guide to maintaining continuity

Overview

To prepare for effective offsite work, technology needs and data security must be actively planned for. The items on this page will ensure both the department and the employee have the necessary tools and resources for successful flexible work arrangements.

The following is guidance for employees when working remotely:

Stay up to date on cybersecurity training

Virginia Tech provides the following training resources for interested employees:

  • Securing the human
  • Computer administrative access request
  • ITSO remote work guidance - coming soon

Ensure you have the proper equipment and connection to perform your job duties

The following things require sufficient bandwidth on your remote connection:

  • Software updates
  • Computer backups
  • Video conferencing

Follow these tips and best practices for telecommuting

  • Keep work data on work computers. Departments should provide an adequate computer for remote work. Personal computers are often shared by other people and are not adequately secured.
  • Update all software on your computer to avoid vulnerabilities in software or ensure your IT department is installing updates to software on your computer
  • Ensure anti-malware software is running and your firewall is enabled
  • Avoid public wi-fi and use the campus VPN when connecting to VT resources
  • Protect the data on your devices by using whole disk encryption (Windows Bitlocker for Windows operating systems and MacOS FileVault for Mac operating systems)
  • Read more about telecommuting best practices.

The following is guidance for departments managing remote employees.
Please Note: All of the following are setup for BAMS supported individuals.

Managing Remote Machines

Virginia Tech policies and standards requires computing resources (e.g., laptop, desktop, or mobile device) to meet a minimum level of security. The Minimum Security Standard, describes these requirements based on data risk classifications. Please consider all points in the standard.

Endpoint protection

Anti-malware software should be installed, actively running, and notifications from software should be immediately reviewed

  • Microsoft Defender for Endpoint is an example of software providing holistic cloud delivered endpoint security. This software protects multiple operating systems.

Endpoint management

Software options

  • JAMF - a best-in-class enterprise device management tool for Apple devices. Allows IT staff members to address IT problems, improve security, and configure devices on the with minimal to no user interruptions. What's more, its on-demand app catalog empowers you to get the resources you need when it's convenient for you.
  • Microsoft Intune - cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). You control how your organization’s devices are used, including mobile phones, tablets, and laptops. You can also configure specific policies to control applications.
  • BigFix - centralized operating system patch management service. Enables both local and central technical support staff to deploy critical security patches to computers on and off campus.

Inventory - Per minimum security standard, tracking of assets, including remote endpoints, are required.

  • Ensure department inventory reflects proper location of devices
  • Complete home use forms

Backups - Per minimum security standard, data backups are required to be actively performed

  • Code42 - simple to use, highly efficient, and very secure. You can take control of your own backups, accessing your data anytime using a web browser or desktop client. Available and in use through VT department
  • Spectrum Protect

IT Risk Assessment - In order to have an accurate picture of data and risk for your department, a risk assessment including remote work aspects should be completed.