As more employees work from home, basic security measures need to be taken to protect the individual and organization from cyber criminals who are taking advantage of lax network security practices.
Think Before You Click
Cyber criminals are taking advantage of people seeking information on COVID-19. They are distributing malware campaigns that impersonate organizations like WHO, CDC, and other reputable websites to access content.
Lock Down Your Login
Create long and unique passphrases for all accounts and use multi-factor authentication (MFA) wherever possible. MFA will fortify your online accounts by enabling the strongest authentication tools available, such as biometrics or a unique one-time code sent to your phone or mobile device.
Connect to a secure network and use a company-issued Virtual Private Network (VPN) to access any work accounts. Home routers should be updated to the most current software and secured with a lengthy, unique passphrase. Employees should not be connecting to public WiFi to access work accounts unless using a VPN.
Separate your network so your company devices are on their own WiFi network, and your personal devices are on their own.
Keep devices with you at all times or stored in a secure location when not in use. Set auto log-out if you walk away from your computer and forget to log out. Limit access to the device you use for work. Only the approved user should use the device (family and friends should not use a work-issued device).
Use company-approved/vetted devices and applications to collaborate and complete your tasks. Don't substitute your preferred tools with ones that have been vetted by the company's security team.
Update your software. Before connecting to your corporate network, be sure that all internet-connected devices ‒including PCs, smartphones and tablets ‒ are running the most current versions of software. Updates include important changes that improve the performance and security of your devices.
As a full suite IT and cybersecurity firm, Restech can help with your business technology and cybersecurity needs. Contact us to learn more.
Source: National Cyber Security Alliance and the U.S. Cybersecurity & Infrastructure Security Agency.