Cyber Security Training For Home & Mobile Working

Remote work has become a necessity for many modern organisations looking to recruit talent and create business continuity plans and while home and remote working has a number of business benefits it also exposes organisations to a range of cyber security risks that need to be managed.

Cyber crime is now the fastest growing areas of global crime and instead of a few small groups and some individuals committing the crimes, larger organised groups have grown up. 

Cyber criminals have learnt from their effective attacks and are becoming more successful with their ransomware and hacking attacks. Cyber criminals are grouping together and working almost with traditional commercial practices and they are becoming more efficient. 

As a consequence every organisation should consider implementing effective risk based policies and procedures to support mobile working, or remote access to systems.

  • Loss or theft of the device: Mobile devices are highly vulnerable to being lost or stolen, potentially offering access to sensitive information or systems. They are often used in open view in locations that cannot offer the same level of physical security as your own premises.
  • Being overlooked: Some users will have to work in public open spaces, such as on public transport, where they are vulnerable to being observed when working. This can potentially compromise sensitive information or authentication credentials.
  • Loss of credentials: If user credentials (such as username, password, or token) are stored with a device used for remote working or remote access and it is lost or stolen, the attacker could use those credentials to compromise services or information stored on (or accessible from) that device.
  • Tampering: An attacker may attempt to subvert the security controls on the device through the insertion of malicious software or hardware if the device is left unattended. This may allow them to monitor all user activity on the device, including authentication credentials.

Educate users and maintain awareness: All users should be trained on the use of their mobile device for the locations they will be working in. Users should be supported to look after their mobile device and operate securely by following clear procedures.

This should include direction on:

  • secure storage and management of user credentials
  • incident reporting
  • environmental awareness of the risks of being monitored and hacked.

What has also become clear is that effective employee cyber training will reduce security costs, improve an organisations future commercial strategy, and will help to protect it against cyber-attacks, hacking, fake news and negative brand PR security.

The reasons why employees are so important for the operations security is because often cyber criminals will perform attacks on an organisation using phishing emails and similar tactics, making employees the first line of defense that needs to be strengthened.

NCSC:       CI Security

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees working at home or in the office in less than a month.

Combining latest insight from global experts with gamification, daily inspiration, social engagement and competition, GoCyber is both credible and fun. All content adheres to some rigorous SIPP standard - Simple, Impactful, Provocative and Personable - which ensures GoCyber is not dull! A genuinely engaging cyber security awareness programme for everyone across the business.

You Might Also Read:

Easing Out Of Lockdown

 

« Chinese Bank Opened Then Closed An Electronic Wallet
New Zealand's NZX Stock Market Hit Five Times »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.