Cyber Security For Home Working

Working from home has become the new normal, creating a cyber security threat in the process. Rising cyber crime attacking remote working have become a serious concern for cyber security professionals as Covid-19 has drastically changed the working environment in all corporate environments all over the globe.

If  you are currently work from home, or if you might start working shortly, it’s important to understand the foundation of today’s digital security risks.

Regardless of industry, your personal devices contain valuable personal information. Even if your technology is up to date, your devices can still encounter virtual threats. Fortunately, and in most cases, the best way to avoid these threats is to know more about them. There are some simple steps that both you and your employees can action to improve your security, even with staff working from home.

Phishing Scams

As many cyber criminals taking advantage of Covid-19 to create new scams, it’s vital your employees stay alert and are educated on how to avoid falling victim to these attempts.

Things you can do:

  • Making it clear how you are contacting your staff and how customers might be contacting them, so out of place or suspicious emails can be identified quickly.
  • Reporting suspicious emails to the NCSC.
  • Encouraging your employees to stick to trusted websites and only opening emails from trusted sources.   

Regular Cyber Security Training

One of the most effective ways to improve your cyber security is through training. It’s important to make sure your employees understand what risks and vulnerabilities exist with home working and provide support to combat these. Try:

  • Providing training sessions and support for any new tools or processes
  • Try and make cyber training fun by adding some competitive spirit or involving rewards for employees.
  • Adopt an ‘if in doubt’ approach so staff aren’t afraid to report any incidents or check any concerns.
  • For business employee cyber security training recommendations please contact Cyber Security Intelligence.

Use Password Managers

Sharing and storing passwords can be more of a challenge when your staff are working from home, especially if you have shared access or have invested in new tools to adapt to remote working. Password managers are online vaults or tools where employees can:

  • Store passwords (to prevent the same password being used across multiple platforms)
  • Create new secure passwords
  • Share passwords with other team members securely

Even with some employees returning to workplaces, investing in cyber security should be a key priority for your business.

Implementing some simple steps to educate staff on what to look out for and how to respond to any breaches or threats can go a long way in improving the overall online security for your business.

With remote working proving successful for many, we may see a situation where businesses explore increasingly flexible work options in the future. While some may have learned from recent experience, if remote working is to continue in a meaningful way, there needs to be greater awareness of the cyber security measures that support it.

Home workers must be fully prepared, in terms of the technology used to protect devices and the knowledge and skills to better protect themselves.   

Staff Training and Awareness

An IT support team can train your staff about the procedures to follow for data security, the importance of following data security norms, and the loss anticipated in case of cyber attacks.

Growth Business:       FINSMES:      Business Reporter:      DIGIT:

For business specific cyber audits and cyber training recommendations, please contact Cyber Security Intelligence.

You Might Also Read:

Organisations Must Use Cyber Security Tools For Remote Working:

 

« Fake PayPal Emails Cost £8million In Theft
Most Large Financial Firms Have Been Attacked In The Past Year »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.