Home Working: Reduce The Cyber Risks

Whilst working from home will not be new to many organisations and employees, the coronavirus is forcing organisations to consider home working on a greater scale, and for a longer period of time. You may have more people working from home than usual, and some of these may not have done it before and this could go on for a lot longer than most people realise.

We live in an inter-connected world and we can work anywhere using the right cyber secure technology. Now video conferencing, live chat, social media and good old-fashioned emails let us catch up and share reports with employees in different time zones.

Working from home can be daunting for some people who haven't done it before, especially if it's a sudden decision. There are also practical considerations; staff who are used to sharing an office space will now be remote. Think about whether you need new services, or to just extend existing ones, so that teams can continue to collaborate. When working from home, make sure you are not helping hackers and scammers gain access to your business and company records.

Without the security protections that office systems afford us - such as firewalls and blacklisted IP addresses, we are far more vulnerable to cyber-attacks.

The most obvious risk is that most of our tasks are conducted online. If something’s on the Internet, then there’s always the possibility of a cyber-criminal compromising it. They might attempt to do this by cracking your password. This could be easier than ever if you’re reusing login credentials for the various online apps that you need to stay in touch with your team.

Alternatively, attackers could send phishing emails that are intended to trick you into either handing over your details or downloading a malicious attachment containing a keylogger. The dangers of phishing should already be a top concern, but things are especially perilous during the coronavirus crisis. If you're an employer with employees working from home, make sure you don't have holes in your Internet security system.

People who specialise in Internet security, say your home work environment may not be as secure as your regular work place and scammers are counting on it. 

Multiple Internet analyses indicate that phishing emails have skyrocketed since March. There have been more than 4.1 million spam emails globally in the last month. That's 139 thousand spam emails per day, many of them desigend to exploit to the  COVID-19 pandemic.

 In addition to phishing scams, cyber security experts said scammers capitalise on hidden work-from-home risks such as workers bypassing employer VPN, using unapproved online file sharing, and unauthorised apps and devices. 

Another vulnerable spot for many work-at-home employees is the your WiFi modem which is your link to the Internet and a gateway for cyber thieves if your password is not extra secure. 

NCSC:       Kaspersky:        ITGovernance:      KOMO News

If you would like more specific information about how you can improve your cyber home and business security, please contact Cyber Security Intelligence  for recommendations on the right solutions for your business. 

You Might Also Read: 

Cyber Criminals Exploit Lockdown Workers:


 

 

« WEBINAR: How to prioritize security controls for sensitive AWS assets
German Critical Infrastructure At Risk Of Russian Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Singularico

Singularico

Singularico help secure your software using the power of AI.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.