Stay Cyber-Secure Working From Home

With many nations working from home, cyber hackers are attempting to exploit vulnerabilities and steal valuable information. Cyber criminals are increasing their activity as they look to capitalise on the Covid-19 crisis. 
 
The current advice from the British National Cyber Security Centre (NCSC), which is a part of GCHQ, details steps on how organisations should prepare for increased remote working and ensure staff are vigilant with work devices that may contain sensitive data. 
 
It warns that employees are more likely to have their devices stolen or lost when they are away from the office or home, so efforts must be made to ensure data is encrypted while in a resting state.
 
In the UK alone, victims lost over £800,000 to coronavirus scams in February, reports the National Fraud Intelligence Bureau. One unlucky person in particular was left £15,000 lighter after buying face masks that never arrived.
Experts are warning of a new wave of cyber-attacks targeting Americans who are forced to work from home during the coronavirus outbreak.
 
There is increasing evidence that hackers are using the concerns over the virus to prey on individuals and that working outside secure office environments opens the door to more cyber vulnerabilities.
 
Despite these risks, remote workers continue to use public Wi-Fi in large numbers. A recent Spiceworks Data survey indicated that more than 60% of organisations’ workers use company-issued devices on public Wi-Fi networks. The proliferation of connected smart devices in the home has increased the number of attack points, which means that remote workers need to be more vigilant about securing their home offices.
 
One of the easiest ways to lower the risks associated with public or poorly secured networks is for companies to require the use of a virtual private network that allows for secure connections. While that can be effective, it also needs to be paired with comprehensive training.
 
Cyber security training staged at regular intervals is imperative for managing all types of threats in the workplace: online, offline, in office or out of the office.
 
When conducting these sessions, however, it’s important to really place an emphasis on the specific challenges associated with remote work.  
  • Show workers how to spot common phishing attacks, raise their awareness of spoofing and other techniques 
  • Ensure that each worker understands the basics of good IT hygiene.
  • A modest investment here can be paid back exponentially if a significant security breach is averted.
To manage risk, it’s important to ensure all software is current and continually updated. Common tools such as malware scanners, firewalls and virtual private networks can also help maintain security.
 
For something a bit more advanced, organisations can choose to deploy breach and attack simulation software. These platforms simulate common attack techniques across likely attack paths to help expose an organisation’s security vulnerabilities. UK Police say that as more of us keep away from the office, they're already seeing an increase in cyber-attacks across the country, so we're being asked to be careful.
 
Tips to Reduce Cyber Risk:
  1. Ensure that your computer systems and virtual environments are resistant to cyber threats and implement stronger security measures where appropriate. Additional layers of encryption or password protection are recommended. 
  2.  Speak to your SaaS (software as a service) vendors about their business continuity plans to ensure there is minimal impact and disruption to your business and that they are ready to assist you with disaster recovery. 
  3. Refresh your staff training on cyber hygiene and looking after personal and confidential information. Get them some cyber training on phishing attacks, cooperation assistance during a data breach, not leaving physical documents lying around, taking care when working on laptops in public spaces.
  4.  Prevent staff using personal, unsecured IT equipment at home and transferring data to unsecured platforms to access data remotely.
  5. Check your Covid-19 response plan, does it cover cyber incident response and are you prepared, and insured, for a data breach? Have you got lawyers and forensic experts you can call on in an incident? 
  6. Make sure you can communicate with all remote working employees if your systems have to be taken offline. Remote working staff must be able to carry out a password reset remotely if needed. 
  7.  Protect your reputation and take measures to protect personal and confidential information, be careful about disclosing employee, customer or supplier health information otherwise you may be in breach of common law and contractual obligations.
Make personal devices secure:
If your organisation has sanctioned the use of personal devices, then it’s important that you implement anti-virus software and make sure that any software and operating systems that you are using are up-to-date.  Outdated software is easy for cyber criminals to exploit.
 
 Adopt secure working practices
Don’t be tempted to make life easier by forwarding information to personal accounts or cloud storage accounts, which are more vulnerable to cyber-attack. Locking your computer when it’s not in use, ensures that other family members don’t accidentally open your device to malware or phishing attempts.
 
Beware of Phishing 
We're warned that cyber criminals are exploiting the coronavirus outbreak as an opportunity to send phishing emails claiming to have important updates or encouraging donations, impersonating trustworthy organisations.
 
For more information on training employees and making them much more cyber-secure please contact Cyber Security Intelligence. 
 
Raconteur:      Security Boulevard:      TechSpark:     BizCommunity:    StrayFM:     The Hill:    Irish News:
 
You Might Also Read: 
 
Remote Working Is On Suddenly On Trend:
 
 
 
 
« Universities That Teach Cyber Security At Risk
WEBINAR: How to design a least privilege architecture in AWS »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Terra Security

Terra Security

Terra Security is the first agentic-AI platform built for web application penetration testing.