Cyber Security For Home Working

Working from home has become the new normal, creating a cyber security threat in the process. Rising cyber crime attacking remote working have become a serious concern for cyber security professionals as Covid-19 has drastically changed the working environment in all corporate environments all over the globe.

If  you are currently work from home, or if you might start working shortly, it’s important to understand the foundation of today’s digital security risks.

Regardless of industry, your personal devices contain valuable personal information. Even if your technology is up to date, your devices can still encounter virtual threats. Fortunately, and in most cases, the best way to avoid these threats is to know more about them. There are some simple steps that both you and your employees can action to improve your security, even with staff working from home.

Phishing Scams

As many cyber criminals taking advantage of Covid-19 to create new scams, it’s vital your employees stay alert and are educated on how to avoid falling victim to these attempts.

Things you can do:

  • Making it clear how you are contacting your staff and how customers might be contacting them, so out of place or suspicious emails can be identified quickly.
  • Reporting suspicious emails to the NCSC.
  • Encouraging your employees to stick to trusted websites and only opening emails from trusted sources.   

Regular Cyber Security Training

One of the most effective ways to improve your cyber security is through training. It’s important to make sure your employees understand what risks and vulnerabilities exist with home working and provide support to combat these. Try:

  • Providing training sessions and support for any new tools or processes
  • Try and make cyber training fun by adding some competitive spirit or involving rewards for employees.
  • Adopt an ‘if in doubt’ approach so staff aren’t afraid to report any incidents or check any concerns.
  • For business employee cyber security training recommendations please contact Cyber Security Intelligence.

Use Password Managers

Sharing and storing passwords can be more of a challenge when your staff are working from home, especially if you have shared access or have invested in new tools to adapt to remote working. Password managers are online vaults or tools where employees can:

  • Store passwords (to prevent the same password being used across multiple platforms)
  • Create new secure passwords
  • Share passwords with other team members securely

Even with some employees returning to workplaces, investing in cyber security should be a key priority for your business.

Implementing some simple steps to educate staff on what to look out for and how to respond to any breaches or threats can go a long way in improving the overall online security for your business.

With remote working proving successful for many, we may see a situation where businesses explore increasingly flexible work options in the future. While some may have learned from recent experience, if remote working is to continue in a meaningful way, there needs to be greater awareness of the cyber security measures that support it.

Home workers must be fully prepared, in terms of the technology used to protect devices and the knowledge and skills to better protect themselves.   

Staff Training and Awareness

An IT support team can train your staff about the procedures to follow for data security, the importance of following data security norms, and the loss anticipated in case of cyber attacks.

Growth Business:       FINSMES:      Business Reporter:      DIGIT:

For business specific cyber audits and cyber training recommendations, please contact Cyber Security Intelligence.

You Might Also Read:

Organisations Must Use Cyber Security Tools For Remote Working:

 

« Fake PayPal Emails Cost £8million In Theft
Most Large Financial Firms Have Been Attacked In The Past Year »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.

Cyber Security Certification Australia (CSCAU)

Cyber Security Certification Australia (CSCAU)

CSCAU is the world’s first 'for mission' industry council set up to address small and medium-sized business (SMB) cyber resilience through annually updated certifiable standards.