Home Working: Reduce The Cyber Risks

Whilst working from home will not be new to many organisations and employees, the coronavirus is forcing organisations to consider home working on a greater scale, and for a longer period of time. You may have more people working from home than usual, and some of these may not have done it before and this could go on for a lot longer than most people realise.

We live in an inter-connected world and we can work anywhere using the right cyber secure technology. Now video conferencing, live chat, social media and good old-fashioned emails let us catch up and share reports with employees in different time zones.

Working from home can be daunting for some people who haven't done it before, especially if it's a sudden decision. There are also practical considerations; staff who are used to sharing an office space will now be remote. Think about whether you need new services, or to just extend existing ones, so that teams can continue to collaborate. When working from home, make sure you are not helping hackers and scammers gain access to your business and company records.

Without the security protections that office systems afford us - such as firewalls and blacklisted IP addresses, we are far more vulnerable to cyber-attacks.

The most obvious risk is that most of our tasks are conducted online. If something’s on the Internet, then there’s always the possibility of a cyber-criminal compromising it. They might attempt to do this by cracking your password. This could be easier than ever if you’re reusing login credentials for the various online apps that you need to stay in touch with your team.

Alternatively, attackers could send phishing emails that are intended to trick you into either handing over your details or downloading a malicious attachment containing a keylogger. The dangers of phishing should already be a top concern, but things are especially perilous during the coronavirus crisis. If you're an employer with employees working from home, make sure you don't have holes in your Internet security system.

People who specialise in Internet security, say your home work environment may not be as secure as your regular work place and scammers are counting on it. 

Multiple Internet analyses indicate that phishing emails have skyrocketed since March. There have been more than 4.1 million spam emails globally in the last month. That's 139 thousand spam emails per day, many of them desigend to exploit to the  COVID-19 pandemic.

 In addition to phishing scams, cyber security experts said scammers capitalise on hidden work-from-home risks such as workers bypassing employer VPN, using unapproved online file sharing, and unauthorised apps and devices. 

Another vulnerable spot for many work-at-home employees is the your WiFi modem which is your link to the Internet and a gateway for cyber thieves if your password is not extra secure. 

NCSC:       Kaspersky:        ITGovernance:      KOMO News

If you would like more specific information about how you can improve your cyber home and business security, please contact Cyber Security Intelligence  for recommendations on the right solutions for your business. 

You Might Also Read: 

Cyber Criminals Exploit Lockdown Workers:


 

 

« WEBINAR: How to prioritize security controls for sensitive AWS assets
German Critical Infrastructure At Risk Of Russian Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.