The remote work revolution hasn’t come without its pitfalls. Many businesses will be having their security fundamentals compromised thanks to a large chunk of their team being separated from the office’s cybersecurity. Thankfully there are various ways remote work cybersecurity can help you protect yourself from the worst. And one of them is by simply familiarising yourself with remote work’s biggest security risks.
Phishing scams
Criminals are finding smarter ways of reaching people’s inboxes and coaxing them into sharing personal information. For example, they’re taking advantage of the rolling out of new software and other IT changes caused by remote work. A scammer might pretend to be “contacting from IT” and ask the target for a password or a two-factor authentication code. Working from home might also mean a shift to employees using their personal email addresses. These could be more relaxed than their professional equivalent when it comes to keeping out suspicious emails.
Passwords
It can be surprisingly easy for a committed criminal to guess a password. Criminals keep a note of common naming conventions in order to guess weak passwords. They have also been known to use programs that will rapidly attempt to guess your password. A remote team can often get careless with its password policy so make sure your team incorporates the following.
- Two-factor authentication. Then even if an attacker cracks the password, they’ll still have another authentication barrier to contend with
- A complex and abstract password. The less like a popular or recognisable word your password is, the harder it will be to crack
- Never write the password down. Neither digitally, nor on a sticky note
Weaker out of office security
With employees making a swift shift to their own homes, there was little time to recreate the security conditions normally found in the office. With home Wi-Fi comes an absence of internet proxy, IDS, and NGFW.
Insider threats
If a team member is feeling malicious, they now have the privacy of their home to steal company data or simply sabotage it. Also, their devices are no longer surrounded by co-workers. They’re surrounded by other members of the household that could easily steal or simply photograph sensitive data on their housemate’s device.
Unsecure data transfer
More working from home can mean more work on home devices and transferring data via unsecured transfer methods, namely ones that don’t have end-to-end encryption. Your home email or something like WeTransfer can have its messages intercepted more easily by a hacker than say, a Microsoft Teams chat.
Sometimes despite your best efforts, remote work cybersecurity measures won’t be enough, and the worst will still happen. In this instance, it’s important to plan and backup your data so that it’s easily restorable. To find out more about how to prepare for anything, click the link below and download our eBook.
Download our business continuity and disaster recovery eBook.
Featured post
Fusion Wins ‘Partner of the Year’ Award from IT Nation
We are delighted to announce that Fusion has been awarded the Partner of the Year Award by IT Nation! This...
Recent posts
Latest posts
Fusion newsletter – October 2024
We've got lots of exciting updates that will boost your productivity and reduce your IT troubles. Read on for more information about our brand new mobile contracts with EE. Achieve more in less time with new tutorials on Microsoft CoPilot from Fusion Learn and meet the newest members of our...
5 ways cloud computing can supercharge your small business
Is your business struggling with flexible working? Are you finding it difficult to update and maintain your devices? Are you confident your data is secure? These are common concerns for small business owners today who are trying to build a thriving company with limited resources. If you’re looking for an...
The value of a Security Operations Centre (SOC) – eBook
Cyber-attacks can occur at any time, which is why we propose a Security Operation Centre (SOC) as a key part of our ‘always-on’ approach to security. This external team of cyber-specialists help our team monitor, prevent, detect, investigate and respond to cyber threats on a 24/7 round-the-clock basis. Read our...