Home Working: Reduce The Cyber Risks

Whilst working from home will not be new to many organisations and employees, the coronavirus is forcing organisations to consider home working on a greater scale, and for a longer period of time. You may have more people working from home than usual, and some of these may not have done it before and this could go on for a lot longer than most people realise.

We live in an inter-connected world and we can work anywhere using the right cyber secure technology. Now video conferencing, live chat, social media and good old-fashioned emails let us catch up and share reports with employees in different time zones.

Working from home can be daunting for some people who haven't done it before, especially if it's a sudden decision. There are also practical considerations; staff who are used to sharing an office space will now be remote. Think about whether you need new services, or to just extend existing ones, so that teams can continue to collaborate. When working from home, make sure you are not helping hackers and scammers gain access to your business and company records.

Without the security protections that office systems afford us - such as firewalls and blacklisted IP addresses, we are far more vulnerable to cyber-attacks.

The most obvious risk is that most of our tasks are conducted online. If something’s on the Internet, then there’s always the possibility of a cyber-criminal compromising it. They might attempt to do this by cracking your password. This could be easier than ever if you’re reusing login credentials for the various online apps that you need to stay in touch with your team.

Alternatively, attackers could send phishing emails that are intended to trick you into either handing over your details or downloading a malicious attachment containing a keylogger. The dangers of phishing should already be a top concern, but things are especially perilous during the coronavirus crisis. If you're an employer with employees working from home, make sure you don't have holes in your Internet security system.

People who specialise in Internet security, say your home work environment may not be as secure as your regular work place and scammers are counting on it. 

Multiple Internet analyses indicate that phishing emails have skyrocketed since March. There have been more than 4.1 million spam emails globally in the last month. That's 139 thousand spam emails per day, many of them desigend to exploit to the  COVID-19 pandemic.

 In addition to phishing scams, cyber security experts said scammers capitalise on hidden work-from-home risks such as workers bypassing employer VPN, using unapproved online file sharing, and unauthorised apps and devices. 

Another vulnerable spot for many work-at-home employees is the your WiFi modem which is your link to the Internet and a gateway for cyber thieves if your password is not extra secure. 

NCSC:       Kaspersky:        ITGovernance:      KOMO News

If you would like more specific information about how you can improve your cyber home and business security, please contact Cyber Security Intelligence  for recommendations on the right solutions for your business. 

You Might Also Read: 

Cyber Criminals Exploit Lockdown Workers:


 

 

« WEBINAR: How to prioritize security controls for sensitive AWS assets
German Critical Infrastructure At Risk Of Russian Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Conference-Service.com

Conference-Service.com

Conference-Service.com provides a categorised calendar of conferences and events which includes Information Security.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.