Stay Cyber-Secure Working From Home

With many nations working from home, cyber hackers are attempting to exploit vulnerabilities and steal valuable information. Cyber criminals are increasing their activity as they look to capitalise on the Covid-19 crisis. 
 
The current advice from the British National Cyber Security Centre (NCSC), which is a part of GCHQ, details steps on how organisations should prepare for increased remote working and ensure staff are vigilant with work devices that may contain sensitive data. 
 
It warns that employees are more likely to have their devices stolen or lost when they are away from the office or home, so efforts must be made to ensure data is encrypted while in a resting state.
 
In the UK alone, victims lost over £800,000 to coronavirus scams in February, reports the National Fraud Intelligence Bureau. One unlucky person in particular was left £15,000 lighter after buying face masks that never arrived.
Experts are warning of a new wave of cyber-attacks targeting Americans who are forced to work from home during the coronavirus outbreak.
 
There is increasing evidence that hackers are using the concerns over the virus to prey on individuals and that working outside secure office environments opens the door to more cyber vulnerabilities.
 
Despite these risks, remote workers continue to use public Wi-Fi in large numbers. A recent Spiceworks Data survey indicated that more than 60% of organisations’ workers use company-issued devices on public Wi-Fi networks. The proliferation of connected smart devices in the home has increased the number of attack points, which means that remote workers need to be more vigilant about securing their home offices.
 
One of the easiest ways to lower the risks associated with public or poorly secured networks is for companies to require the use of a virtual private network that allows for secure connections. While that can be effective, it also needs to be paired with comprehensive training.
 
Cyber security training staged at regular intervals is imperative for managing all types of threats in the workplace: online, offline, in office or out of the office.
 
When conducting these sessions, however, it’s important to really place an emphasis on the specific challenges associated with remote work.  
  • Show workers how to spot common phishing attacks, raise their awareness of spoofing and other techniques 
  • Ensure that each worker understands the basics of good IT hygiene.
  • A modest investment here can be paid back exponentially if a significant security breach is averted.
To manage risk, it’s important to ensure all software is current and continually updated. Common tools such as malware scanners, firewalls and virtual private networks can also help maintain security.
 
For something a bit more advanced, organisations can choose to deploy breach and attack simulation software. These platforms simulate common attack techniques across likely attack paths to help expose an organisation’s security vulnerabilities. UK Police say that as more of us keep away from the office, they're already seeing an increase in cyber-attacks across the country, so we're being asked to be careful.
 
Tips to Reduce Cyber Risk:
  1. Ensure that your computer systems and virtual environments are resistant to cyber threats and implement stronger security measures where appropriate. Additional layers of encryption or password protection are recommended. 
  2.  Speak to your SaaS (software as a service) vendors about their business continuity plans to ensure there is minimal impact and disruption to your business and that they are ready to assist you with disaster recovery. 
  3. Refresh your staff training on cyber hygiene and looking after personal and confidential information. Get them some cyber training on phishing attacks, cooperation assistance during a data breach, not leaving physical documents lying around, taking care when working on laptops in public spaces.
  4.  Prevent staff using personal, unsecured IT equipment at home and transferring data to unsecured platforms to access data remotely.
  5. Check your Covid-19 response plan, does it cover cyber incident response and are you prepared, and insured, for a data breach? Have you got lawyers and forensic experts you can call on in an incident? 
  6. Make sure you can communicate with all remote working employees if your systems have to be taken offline. Remote working staff must be able to carry out a password reset remotely if needed. 
  7.  Protect your reputation and take measures to protect personal and confidential information, be careful about disclosing employee, customer or supplier health information otherwise you may be in breach of common law and contractual obligations.
Make personal devices secure:
If your organisation has sanctioned the use of personal devices, then it’s important that you implement anti-virus software and make sure that any software and operating systems that you are using are up-to-date.  Outdated software is easy for cyber criminals to exploit.
 
 Adopt secure working practices
Don’t be tempted to make life easier by forwarding information to personal accounts or cloud storage accounts, which are more vulnerable to cyber-attack. Locking your computer when it’s not in use, ensures that other family members don’t accidentally open your device to malware or phishing attempts.
 
Beware of Phishing 
We're warned that cyber criminals are exploiting the coronavirus outbreak as an opportunity to send phishing emails claiming to have important updates or encouraging donations, impersonating trustworthy organisations.
 
For more information on training employees and making them much more cyber-secure please contact Cyber Security Intelligence. 
 
Raconteur:      Security Boulevard:      TechSpark:     BizCommunity:    StrayFM:     The Hill:    Irish News:
 
You Might Also Read: 
 
Remote Working Is On Suddenly On Trend:
 
 
 
 
« Universities That Teach Cyber Security At Risk
WEBINAR: How to design a least privilege architecture in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Active Navigation

Active Navigation

Active Navigation is a data privacy and governance software company.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.