Management Checklist for Teleworking Surge During the Covid-19 Response

While teleworking has become a routine way of doing business in many industry sectors and government, teleworking during wide-scale public emergencies such as what we are experiencing with the emergence of the COVID-19 virus introduces significant management, technology and bandwidth challenges to ensuring uninterrupted and efficient workflow and provision of services to the public. Added strain on the public telecommunications infrastructure over the “last mile” to the home, in particular, requires critical healthcare entities to assess risk, prioritize tasks and apportion bandwidth resources to ensure continuity of mission-essential functions that may migrate off premises to the home office environment.

This checklist is designed as a quick reference for healthcare enterprise management to consider important factors in a teleworking strategy that minimizes downtime and latency while supporting patient care, operational and I.T. security, and supply chain resilience.

Related Resources

Testimony
Public
John Riggi, AHA senior advisor for cybersecurity and risk, testimony before the Senate Homeland Security and Governmental Affairs Committee on defending…
Special Bulletin
Member
Federal agencies this morning are providing new information on an imminent ransomware threat to U.S. hospitals.
Special Bulletin
Member
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS)…
Issue Landing Page
The number of large-scale data breaches at American health care organization increased 65% from 2010 to 2016. As a result, federal agencies are increasing…
Guides/Reports
Trusted insiders, both witting and unwitting, can cause grave harm to your organizations facilities, resources, information, and personnel. Insider incidents…
Standards/Guidelines
Public
Agent Tesla is an established Remote Access Trojan (RAT) written in .Net. A successful deployment of Agent Tesla provides attackers with full computer or…