Management Checklist for Teleworking Surge During the Covid-19 Response

While teleworking has become a routine way of doing business in many industry sectors and government, teleworking during wide-scale public emergencies such as what we are experiencing with the emergence of the COVID-19 virus introduces significant management, technology and bandwidth challenges to ensuring uninterrupted and efficient workflow and provision of services to the public. Added strain on the public telecommunications infrastructure over the “last mile” to the home, in particular, requires critical healthcare entities to assess risk, prioritize tasks and apportion bandwidth resources to ensure continuity of mission-essential functions that may migrate off premises to the home office environment.

This checklist is designed as a quick reference for healthcare enterprise management to consider important factors in a teleworking strategy that minimizes downtime and latency while supporting patient care, operational and I.T. security, and supply chain resilience.

Related Resources

Guides/Reports
As a member of the Healthcare and Public Health Sector, you play a significant role in national security by protecting the nation and its economy from hazards…
Standards/Guidelines
Public
Agent Tesla is an established Remote Access Trojan (RAT) written in .Net. A successful deployment of Agent Tesla provides attackers with full computer or…
Webinar Recordings
Public
The U.S. Department of Health and Human Services’ (HHS) Health Sector Cybersecurity Coordination Center (HC3) invites you to join its monthly cybersecurity…
Guides/Reports
Working from Home during COVID-19 Pandemic During the COVID-19 pandemic, many physicians are working from home, using their personal computers and mobile…
Guides/Reports
Public
Mozilla Patches Critical Vulnerabilities in Firefox, Firefox ESR 04/03/2020 04:45 PM EDT Original release date: April 3, 2020 Mozilla has released security…
Special Bulletin
Public
A recent campaign of cyberattacks from a foreign threat actor targeted healthcare organizations and specifically exploited Citrix and Zoho technologies used…