The Enabling Technologies Blog

Chris Stegh / /

Work from Home Security Checklist

Perimeter security is dead. With data being accessed from unknown locations on untrusted devices, new risks are at an all-time high.  These checklists organized by our security experts: Scott Barr and Chris Stegh, are meant to highlight the most important tasks to ensure your users, devices, apps, and data are protected. It focuses on hybrid Microsoft O365 and (Azure) Active Directory technologies. It is not meant to be a completely exhaustive list.  Download your checklist here:  Work From Home Security Checklist


Subscribe to Email Updates

Refine by

To expand the list, please click on the double arrows.


Search by Category or Author: