Cyber Security For Home Working

Working from home has become the new normal, creating a cyber security threat in the process. Rising cyber crime attacking remote working have become a serious concern for cyber security professionals as Covid-19 has drastically changed the working environment in all corporate environments all over the globe.

If  you are currently work from home, or if you might start working shortly, it’s important to understand the foundation of today’s digital security risks.

Regardless of industry, your personal devices contain valuable personal information. Even if your technology is up to date, your devices can still encounter virtual threats. Fortunately, and in most cases, the best way to avoid these threats is to know more about them. There are some simple steps that both you and your employees can action to improve your security, even with staff working from home.

Phishing Scams

As many cyber criminals taking advantage of Covid-19 to create new scams, it’s vital your employees stay alert and are educated on how to avoid falling victim to these attempts.

Things you can do:

  • Making it clear how you are contacting your staff and how customers might be contacting them, so out of place or suspicious emails can be identified quickly.
  • Reporting suspicious emails to the NCSC.
  • Encouraging your employees to stick to trusted websites and only opening emails from trusted sources.   

Regular Cyber Security Training

One of the most effective ways to improve your cyber security is through training. It’s important to make sure your employees understand what risks and vulnerabilities exist with home working and provide support to combat these. Try:

  • Providing training sessions and support for any new tools or processes
  • Try and make cyber training fun by adding some competitive spirit or involving rewards for employees.
  • Adopt an ‘if in doubt’ approach so staff aren’t afraid to report any incidents or check any concerns.
  • For business employee cyber security training recommendations please contact Cyber Security Intelligence.

Use Password Managers

Sharing and storing passwords can be more of a challenge when your staff are working from home, especially if you have shared access or have invested in new tools to adapt to remote working. Password managers are online vaults or tools where employees can:

  • Store passwords (to prevent the same password being used across multiple platforms)
  • Create new secure passwords
  • Share passwords with other team members securely

Even with some employees returning to workplaces, investing in cyber security should be a key priority for your business.

Implementing some simple steps to educate staff on what to look out for and how to respond to any breaches or threats can go a long way in improving the overall online security for your business.

With remote working proving successful for many, we may see a situation where businesses explore increasingly flexible work options in the future. While some may have learned from recent experience, if remote working is to continue in a meaningful way, there needs to be greater awareness of the cyber security measures that support it.

Home workers must be fully prepared, in terms of the technology used to protect devices and the knowledge and skills to better protect themselves.   

Staff Training and Awareness

An IT support team can train your staff about the procedures to follow for data security, the importance of following data security norms, and the loss anticipated in case of cyber attacks.

Growth Business:       FINSMES:      Business Reporter:      DIGIT:

For business specific cyber audits and cyber training recommendations, please contact Cyber Security Intelligence.

You Might Also Read:

Organisations Must Use Cyber Security Tools For Remote Working:

 

« Fake PayPal Emails Cost £8million In Theft
Most Large Financial Firms Have Been Attacked In The Past Year »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Portuguese Institute for Accreditation (IPAC)

Portuguese Institute for Accreditation (IPAC)

IPAC is the national accreditation body for Portugal. The directory of members provides details of organisations offering certification services for ISO 27001.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Black Cybersecurity Association (BCA)

Black Cybersecurity Association (BCA)

Black Cybersecurity Association is an inclusive non-profit organization focused on community, and career mentorship for underrepresented minorities in the cybersecurity industry.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.