Remote/ Hybrid Workforce
defences, however, the less likely they are to bother trying and will move on to alternative targets.
Tips: Steps to firm up the security of your wireless routers
1. Pick a new username (many routers ship with the same default username from the manufacturer, such as “admin”) along with a complex password that contains letters, numbers, and symbols.
2. Ensure firmware updates from the manufacturer are routinely installed so that security vulnerabilities can be patched.
3. Use the highest levels of encryption available – such as WPA2 or WPA3.
4. Restrict inbound and outbound traffic. 5. Disable all unused services.
3. Set Up Firewalls Your remote workers’ devices and routers will likely have built-in firewalls, which create a barrier of defence between the device and the Internet by closing ports to communication. Why: Firewalls help prevent malicious programs from entering and can stop data leaking from devices. Ensure that your remote workers enable these built-in firewalls if they’re present. If any device used for work doesn’t have a built-in firewall, the worker must immediately install one from a third-party provider. However, even if they do, an additional third-party firewall can offer added protection, and you should encourage your remote workforce to install one.
4. Install Antivirus Software Robust antivirus soſtware that will protect your remote workers against malware already exists – and they should use it.
Why: While firewalls act as an excellent first line of defence, they are not perfect, and installing antivirus soſtware as well as an additional firewall increases your workers’ chances of keeping their equipment malware-free.
5. Use a Virtual Private Network (VPN) Using a VPN is a simple yet hugely effective home cybersecurity technique for remote workers. Why: A VPN will encrypt all traffic going to and from your employees’ devices, rendering it unreadable to anyone who should try to intercept it, thereby keeping your company information safe.
Tips: Create a personal tunnel for Internet traffic By creating a persona and encrypted tunnel for Internet traffic to go through that no one else can access, you can effectively help secure your information. It’s important to note, however, that using a VPN can slow down Internet speeds, so it’s essential to choose one known not only for its high security but speed and reliability as well.
6. Use Strong Passwords Last but by no means least is to ensure all accounts are protected with strong passwords. Why: According to a 2021 IBM report, stolen credentials are the most common cause of data breaches, making employee passwords one of the biggest ongoing threats to corporate security – whether the employees using them are remote working or not. Depending on your business, the number of applications
your employees may need to use to perform their duties can reach dozens, if not hundreds. Effective identity management is therefore crucial. Strong, unique passwords should be used for every application – but password reuse is by no means uncommon. Te IBM report notes that “82% of individuals surveyed admitted they reuse passwords across accounts, compromised credentials represent both a leading cause and effect of data breaches, creating a compounding risk for businesses.” Tis means that if a cybercriminal were to compromise one
password, they could use credential stuffing techniques to try and log in to other online accounts and steal any data they find.
Tips: The use of password managers A robust password policy must therefore be enforced. It is, of course, almost impossible for employees to remember a long list of strong passwords with strings of random letters, numbers, and symbols. As such, the use of password managers which create, retain, and autofill passwords should be endorsed.
7. Distribute company devices, or use remote desktops:
Working from home means that many of your employees have to rely on their personal devices – computers, smartphones, and tablets, plus any internet access hardware – to complete work tasks. Te trouble here is that these devices usually lack the tools and
solutions that an office device would automatically have – such as a VPN, antivirus, and a secure network. Although this isn’t possible for all companies and requires an
initial investment, an elegant solution to the working from home problems is distributing work on computers. In this way, you could ensure that they have all the necessary
defence mechanisms installed – though this may, of course, be a prohibitively expensive strategy to deploy, especially during times of crisis.
www.pcr-online.biz December/January 2022 | 37
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68