Home Working: Reduce The Cyber Risks

Whilst working from home will not be new to many organisations and employees, the coronavirus is forcing organisations to consider home working on a greater scale, and for a longer period of time. You may have more people working from home than usual, and some of these may not have done it before and this could go on for a lot longer than most people realise.

We live in an inter-connected world and we can work anywhere using the right cyber secure technology. Now video conferencing, live chat, social media and good old-fashioned emails let us catch up and share reports with employees in different time zones.

Working from home can be daunting for some people who haven't done it before, especially if it's a sudden decision. There are also practical considerations; staff who are used to sharing an office space will now be remote. Think about whether you need new services, or to just extend existing ones, so that teams can continue to collaborate. When working from home, make sure you are not helping hackers and scammers gain access to your business and company records.

Without the security protections that office systems afford us - such as firewalls and blacklisted IP addresses, we are far more vulnerable to cyber-attacks.

The most obvious risk is that most of our tasks are conducted online. If something’s on the Internet, then there’s always the possibility of a cyber-criminal compromising it. They might attempt to do this by cracking your password. This could be easier than ever if you’re reusing login credentials for the various online apps that you need to stay in touch with your team.

Alternatively, attackers could send phishing emails that are intended to trick you into either handing over your details or downloading a malicious attachment containing a keylogger. The dangers of phishing should already be a top concern, but things are especially perilous during the coronavirus crisis. If you're an employer with employees working from home, make sure you don't have holes in your Internet security system.

People who specialise in Internet security, say your home work environment may not be as secure as your regular work place and scammers are counting on it. 

Multiple Internet analyses indicate that phishing emails have skyrocketed since March. There have been more than 4.1 million spam emails globally in the last month. That's 139 thousand spam emails per day, many of them desigend to exploit to the  COVID-19 pandemic.

 In addition to phishing scams, cyber security experts said scammers capitalise on hidden work-from-home risks such as workers bypassing employer VPN, using unapproved online file sharing, and unauthorised apps and devices. 

Another vulnerable spot for many work-at-home employees is the your WiFi modem which is your link to the Internet and a gateway for cyber thieves if your password is not extra secure. 

NCSC:       Kaspersky:        ITGovernance:      KOMO News

If you would like more specific information about how you can improve your cyber home and business security, please contact Cyber Security Intelligence  for recommendations on the right solutions for your business. 

You Might Also Read: 

Cyber Criminals Exploit Lockdown Workers:


 

 

« WEBINAR: How to prioritize security controls for sensitive AWS assets
German Critical Infrastructure At Risk Of Russian Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.