Over the last years I've met a lot of customers that were not capable of managing their devices. It's more important than ever to have control on endpoints to empower remote-workers to be able to use modern and secure technology. I personally believe that right now is a massive opportunity to build decentral systems that are designed different than ever before.

The 10 security recommendations we should consider while working from home:

1
Identity Security / MFA
2
Install the latest patches and updates
3
Passwords and management
4
Build real-time reports of security risks
5
Create automated and intelligent alerts
6
Install antivirus on all endpoints
7
Secure devices and corporate devices (+ personal phones)
8
Evaluate regularly which users have access to data, devices and networks
9
Track, change and block access for temporary projects and when employees are leaving
10
Use information protection solutions to protect your data everywhere

1. Identity protection

1.2 million Office 365 accounts are compromised each month — representing 0.5% of all accounts.
Multi-factor authentication prevents 99.9% of all attacks.
Azure AD — Identity protection and risky sign-ins
Azure AD Identity Protection — risky users and sign-ins

2. Patching & updates

Microsoft Endpoint Manager — device compliance and patching
Microsoft Endpoint Manager — patching and update compliance

3. Passwords and management of authentication

Azure AD — Passwordless authentication and Windows Hello for Business
Azure AD — Passwordless authentication options

4. Create real-time reporting of security vulnerabilities

Azure AD Identity Protection — real-time risk reporting dashboard
Azure AD Identity Protection — real-time risk reporting

5. Create automated and intelligent alerts

There is only 1 answer: Microsoft Cloud App Security.
Microsoft Cloud App Security — automated alerts configuration
Microsoft Cloud App Security — intelligent alert policies

6. Install antivirus on ALL endpoints + go beyond antivirus

Microsoft Defender ATP — endpoint antivirus and EDR overview
Microsoft Defender ATP — unified endpoint protection and EDR

7. Secure private (personal) devices and corporate devices

Intune Mobile Application Management — Outlook app protection policy
Intune — Outlook protected by Mobile Application Management (MAM)

8. Evaluate regularly which users have access to data, devices and physical network

Microsoft Cloud App Security — data access and traffic overview
Cloud App Security — access overview across data, devices and network

9. Track and block access for temporary projects or when employees leave

Microsoft 365 — retention policies and access governance
Microsoft 365 — retention and access governance policies

10. Use information protection to protect your data everywhere

Microsoft Information Protection — document sensitivity labels and policies
Microsoft Information Protection — sensitivity labels protecting data everywhere

Conclusions

Thanks for reading! Also read my blog about: how to build a Zero Trust Modern Workplace with Microsoft 365 and why each company should move to Microsoft 365 E3 or E5.