Hi [[ session.user.profile.firstName ]]

Best Practices for Working Remotely

Working remotely means something entirely different in a COVID-19 era. This webinar will review the basics of remote support to ensure your users are prepared to work remotely in a secure manner. We'll also discuss remote access security and how to support home networks. Learn how to set up multi-factor authentication and VPN access for your users as well.

This webinar is presented by Matt Essig, Associate Systems Engineer, at Logically.
Recorded May 13 2020 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Essig
Presentation preview: Best Practices for Working Remotely

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Six Reasons it May Be Time to Switch IT Service Providers Nov 18 2020 7:00 pm UTC 68 mins
    Nick Cavalancia
    A great IT support provider will help your organization grow, reduce costs and delight your customers. The wrong one will slow you down, waste your money and expose your business to performance and security risks. Learn how to identify shortfalls in your current Managed IT Service Provider and determine if it’s time to switch.
  • Best Practices for Working Remotely Nov 11 2020 7:00 pm UTC 38 mins
    Matt Essig
    Working remotely means something entirely different in a COVID-19 era. This webinar will review the basics of remote support to ensure your users are prepared to work remotely in a secure manner. We'll also discuss remote access security and how to support home networks. Learn how to set up multi-factor authentication and VPN access for your users as well.

    This webinar is presented by Matt Essig, Associate Systems Engineer, at Logically.
  • Untangling the Cloud for Your Business Nov 4 2020 7:00 pm UTC 55 mins
    Mike Matchett
    The Cloud is everywhere. Smart organizations are using the cloud to lower costs, move faster, and improve resiliency. Watch our webinar Untangling the Cloud for Your Business to learn about common cloud misconceptions, prioritizing which cloud services are right for you, and how to successfully move to the cloud.
  • Avoiding the Phish Bowl Oct 28 2020 6:00 pm UTC 26 mins
    Tyler Booker and Jeffrey Bell
    Phishing emails are the easiest way for cyber criminals to get into your environment. This webinar will review best practices for phishing. You will see real-world examples of phishing emails and learn more about the impact of clicking on these emails. This webinar is presented in partnership with the Portland Regional Chamber of Commerce. The presenters are Tyler Booker, Senior Auditor, and Jeffrey Bell, Security, Audit, and Compliance Intern, of Logically.
  • The Benefits of Security Training Oct 21 2020 6:00 pm UTC 39 mins
    Caleb Pipkin and Aaron Scurlock
    An organization's users can be the biggest threat to their security if they are not properly trained. Security training is designed to increase security awareness among staff and to meet compliance regulations. In this webinar, we will review the framework-based training we provide to train users and review the benefits of security training. This webinar is presented in partnership with the Portland Regional Chamber of Commerce. Our presenters are Caleb Pipkin, Security Solutions Engineer, and Aaron Scurlock, Senior Auditor, of Logically.
  • EDR and SIEM-SOC Oct 14 2020 6:00 pm UTC 50 mins
    Greg Manson and Tyler Booker
    As cyberattacks increase, it's important to have a strong security plan in place. In this webinar, we will review the importance of having an Endpoint Detection and Response (EDR) solution and a SIEM SOC solution in place. The Security Information and Event Management (SIEM) solution provides a proactive approach to event monitoring with real-time alerts, trend analysis, and threat intelligence. A Security Operations Center (SOC) is a specialized group of cybersecurity professionals within a secure facility who monitor and analyze an organization’s security posture and defend their IT environment on an ongoing basis.

    This webinar is presented by Greg Manson, VP of Security, Audit, and Compliance, and Tyler Booker, Senior Auditor, of Logically.
  • How Not to Be a Victim Oct 7 2020 6:00 pm UTC 43 mins
    Tyler Booker
    Did you know 40% of security breaches occur from the inside? Contrary to what you may think, the biggest threat to your environment is not getting hacked or losing equipment – the biggest threat is your employees. In fact, almost all security issues begin with human error. Security Training is designed to increase security awareness among staff and to meet compliance regulations.

    In this webinar, we will review the basics of security training and how not to be a victim of a breach or attack. This webinar is presented by Tyler Booker, Senior Auditor, at Logically.
  • Three Reasons Why You Should Outsource Your IT Sep 30 2020 6:00 pm UTC 44 mins
    Nick Cavalancia
    Small and mid-sized businesses (SMBs) have unique challenges when it comes to IT. Like with larger organizations, there’s a need to leverage technology to innovate, increase productivity, and drive profitability, but without the luxury of a well-staffed IT team. MSPs help SMBs gain access to the technology that can help achieve their goals - along with the experts to manage it and keep their data secure and protected.
  • CIS Risk Assessment Methodology Sep 23 2020 6:00 pm UTC 44 mins
    Greg Manson
    The Center for Internet Security (CIS) sets the standards for IT security by defining the best practice criteria to reduce risk in your IT environment. Along with NIST and ISO, Logically follows CIS standards and controls as part of our approach to securing your environment.

    In this webinar, we will review the Risk Assessment Methodology as directed by CIS. This webinar is presented by Greg Manson, Vice President of Security, Audit, and Compliance at Logically.
  • Team Up: Using Microsoft Teams Webinar Recorded: Sep 16 2020 29 mins
    Tom Shanley
    Collaboration is essential in the workforce today. Even before the COVID-19 crisis, organizations had a need for employees to work anywhere, any time. Microsoft Teams is a cloud-based collaboration app that integrates with Sharepoint, allowing users to chat, call, meet, and share files from anywhere. In this webinar, we will review the benefits of the application.
  • Application Security Recorded: Sep 9 2020 35 mins
    Aaron Scurlock
    This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
  • Creating Your Disaster Recovery and Incident Response Plan Recorded: Sep 2 2020 27 mins
    Caleb Pipkin
    Creating a Disaster Recovery and Incident Response plan for your business is a critical part of your security strategy. What happens if you are the victim of a breach or cyberattack? Would you be able to resume business operations in a timely manner? How would your business continue to operate in the face of a disaster?

    These questions and more will be answered in this webinar. The webinar is presented by Caleb Pipkin, Security Solutions Engineer, of Logically.
  • A Layered Approach to Security Recorded: Aug 28 2020 51 mins
    Danielle Painter
    Learn more about Huntress Labs, a security platform that helps organizations minimize their risk for cyberattacks.This webinar is hosted by Logically.
  • The Fear Factor Recorded: Aug 26 2020 43 mins
    Greg Manson
    Security is a top priority for organizations today. Presented by Greg Manson, Director of Security, Audit, and Compliance at Logically, this webinar will help organizations improve their security posture.

    Attendees will learn:
    Scare tactics organizations are facing
    Threats and vulnerabilities that exist in your environment
    Steps you can take to minimize the risks of your employees
  • Making Hackers Earn Their Access Recorded: Aug 19 2020 60 mins
    Kyle Hanslovan
    We all know hackers target our businesses. However, most of us never get to see the breach from the hackers’ perspective. During this presentation, an ex-NSA operator will show you exactly how hackers target their victims, compromise their computers, and what they’re capable of doing with little effort. Hold onto your shorts and enjoy this interactive session!

    This webinar is presented by Kyle Hanslovan, Co-Founder of Huntress Labs.
  • Making Hackers Earn Their Access Recorded: Jul 1 2020 61 mins
    Kyle Hanslovan
    We all know hackers target our businesses. However, most of us never get to see the breach from the hackers’ perspective. During this presentation, an ex-NSA operator will show you exactly how hackers target their victims, compromise their computers, and what they’re capable of doing with little effort. Hold onto your shorts and enjoy this interactive session!

    This webinar is presented by Kyle Hanslovan, Co-Founder of Huntress Labs.
  • The Fear Factor Recorded: Jun 30 2020 44 mins
    Greg Manson
    Security is a top priority for organizations today. Presented by Greg Manson, Director of Security, Audit, and Compliance at Logically, this webinar will help organizations improve their security posture.

    Attendees will learn:
    Scare tactics organizations are facing
    Threats and vulnerabilities that exist in your environment
    Steps you can take to minimize the risks of your employees
  • Creating Your Disaster Recovery and Incident Response Plan Recorded: Jun 23 2020 28 mins
    Caleb Pipkin
    Creating a Disaster Recovery and Incident Response plan for your business is a critical part of your security strategy. What happens if you are the victim of a breach or cyberattack? Would you be able to resume business operations in a timely manner? How would your business continue to operate in the face of a disaster?

    These questions and more will be answered in this webinar. The webinar is presented by Caleb Pipkin, Security Solutions Engineer, of Logically.
  • Application Security Recorded: Jun 16 2020 36 mins
    Aaron Scurlock
    This webinar will be presented by Aaron Scurlock, a Senior Auditor at Logically. Aaron has over 15 years’ experience in IT management where he implemented policies, procedures, and security risk and compliance. During this webinar, he will review the elements of application security within your environment.
  • CIS Risk Assessment Methodology Recorded: Jun 9 2020 45 mins
    Greg Manson
    The Center for Internet Security (CIS) sets the standards for IT security by defining the best practice criteria to reduce risk in your IT environment. Along with NIST and ISO, Logically follows CIS standards and controls as part of our approach to securing your environment.

    In this webinar, we will review the Risk Assessment Methodology as directed by CIS. This webinar is presented by Greg Manson, Vice President of Security, Audit, and Compliance at Logically.
Your Trusted IT Ally
Our mission is to enable small and midsized organizations to achieve their business objectives through information technology. To do that, our customers need a trusted IT ally with a wide and deep bench of IT talent with expertise in emerging and critical technologies such as cloud, cybersecurity, Office 365, mobility, and how the modern workplace operates. A trusted IT ally that can deliver reliability and operational excellence at an affordable price. A trusted IT ally like Logically.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Working Remotely
  • Live at: May 13 2020 4:05 pm
  • Presented by: Matt Essig
  • From:
Your email has been sent.
or close