Cyber Security For Home Working

Working from home has become the new normal, creating a cyber security threat in the process. Rising cyber crime attacking remote working have become a serious concern for cyber security professionals as Covid-19 has drastically changed the working environment in all corporate environments all over the globe.

If  you are currently work from home, or if you might start working shortly, it’s important to understand the foundation of today’s digital security risks.

Regardless of industry, your personal devices contain valuable personal information. Even if your technology is up to date, your devices can still encounter virtual threats. Fortunately, and in most cases, the best way to avoid these threats is to know more about them. There are some simple steps that both you and your employees can action to improve your security, even with staff working from home.

Phishing Scams

As many cyber criminals taking advantage of Covid-19 to create new scams, it’s vital your employees stay alert and are educated on how to avoid falling victim to these attempts.

Things you can do:

  • Making it clear how you are contacting your staff and how customers might be contacting them, so out of place or suspicious emails can be identified quickly.
  • Reporting suspicious emails to the NCSC.
  • Encouraging your employees to stick to trusted websites and only opening emails from trusted sources.   

Regular Cyber Security Training

One of the most effective ways to improve your cyber security is through training. It’s important to make sure your employees understand what risks and vulnerabilities exist with home working and provide support to combat these. Try:

  • Providing training sessions and support for any new tools or processes
  • Try and make cyber training fun by adding some competitive spirit or involving rewards for employees.
  • Adopt an ‘if in doubt’ approach so staff aren’t afraid to report any incidents or check any concerns.
  • For business employee cyber security training recommendations please contact Cyber Security Intelligence.

Use Password Managers

Sharing and storing passwords can be more of a challenge when your staff are working from home, especially if you have shared access or have invested in new tools to adapt to remote working. Password managers are online vaults or tools where employees can:

  • Store passwords (to prevent the same password being used across multiple platforms)
  • Create new secure passwords
  • Share passwords with other team members securely

Even with some employees returning to workplaces, investing in cyber security should be a key priority for your business.

Implementing some simple steps to educate staff on what to look out for and how to respond to any breaches or threats can go a long way in improving the overall online security for your business.

With remote working proving successful for many, we may see a situation where businesses explore increasingly flexible work options in the future. While some may have learned from recent experience, if remote working is to continue in a meaningful way, there needs to be greater awareness of the cyber security measures that support it.

Home workers must be fully prepared, in terms of the technology used to protect devices and the knowledge and skills to better protect themselves.   

Staff Training and Awareness

An IT support team can train your staff about the procedures to follow for data security, the importance of following data security norms, and the loss anticipated in case of cyber attacks.

Growth Business:       FINSMES:      Business Reporter:      DIGIT:

For business specific cyber audits and cyber training recommendations, please contact Cyber Security Intelligence.

You Might Also Read:

Organisations Must Use Cyber Security Tools For Remote Working:

 

« Fake PayPal Emails Cost £8million In Theft
Most Large Financial Firms Have Been Attacked In The Past Year »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.