COVID-19 is not going anywhere anytime fast. It has affected us all in one way or another, resulting in businesses enabling for a remote workforce for the foreseeable future. Working from home has specific cyber security risks that when compromised, unauthorized access to your companies stored and personal information can have a devastating effect across your organization.
Cyber criminals love crisis’. They strive on this opportunity as employees are working from home to target them in a new environment and increased end-points. Exercise critical thinking when receiving phone calls, emails, and messages and use caution when clicking links or opening attachments. If you have any doubt at all regarding the sender, use a 2nd form of communication to verify.
Using strong passwords and passphrases are your first line of defense. Make sure you are using different passwords for each different accounts, websites and apps.
Multi-factor authentication is single handily one of the most effective tools you can implement to prevent unauthorized access to computers, networks and applications. Learn more about Multi-factor authentication and how to use it within this blog post.
Keeping your software and applications up to date is crucial to keeping your data secured. Latest patches, bug fixes…etc. need to be updated as soon as they come out to ensure your networks are not left at vulnerable risks. Consider configuring your software to update automatically so you never forget.
A Virtual Private Network is a secure connection between 2 points, creating a “tunnel” in which your data travels. They are popular in connecting portable devices to a work network. VPN’s are known to secure your web browsing and remote network access. However, not all VPN’s are created equally. Contact us today to find out which one you should implement.
Using free wireless internet may be tempting but it can also put your information at risk. To ensure best practices, use trusted connections only when working from home and make sure your router is up to date so you’re working on secured wifi.
Although these are all good cyber security practices for individuals working remotely, as a business owner you should continually be controlling and monitoring employee activity and know your network. Everything on your corporate network should be identified, properly categorized, and controlled. Book a consultation or contact a business representative today to learn more and find out how to properly protect your business.