Top 3 Information & Cyber Security Tips For Homeworking
Amongst the many lessons learned ver the last twelve months, one of the most apparent is the necessity for businesses to be able to swiftly adapt to new working situations.
With a sizable percentage of work now being performed remotely, and for many, a return to work on the horizon, it is now time for us all to take what we have learnt, and to apply those lessons moving forward.
Remote Working Security
Undoubtedly, many of us have had to adapt and learn new skills. Whether that is video conferencing etiquette, or how to properly set up a virtual privacy network (VPN), it is time to ask: what are the remote work security lessons that can be applied elsewhere?
Top 3 Information Security Lessons
Wi-Fi Security
With internet usage at its highest recorded, there are many of us the rely entirely on our Wi-Fi for remote work. Though many of these are private networks, that does not necessarily mean that these are secure networks.
As with public Wi-Fi networks, we should all understand the dangers inherent to unsecure networks and take the time and steps necessary to protect our, and our organisation’s information.
This includes:
- Ensuring the network is using the strongest encryption available
- Disabling Wi-Fi protected Setup (WPS)
- Making use of MAC address filters, and
- Changing default usernames and passwords.
By following these steps and hopefully having become a little more self-reliant, upon our gradual return to non-remote work, we can apply the information and cyber security skills
Phishing Attacks
With the upsurge in coronavirus related phishing attacks, for those in a remote work environment, there is a renewed emphasis on the need for spotting and avoiding phishing attacks.
As communications are becming increasingly electronic and data being likely more diffused, the danger of users increasing their willingness to click on emails should be a concern for all organisations.
Like always, there a simple and easy to understand techniques that can be used to spot phishing emails, regardless of if you are working from home, or, as you may soon be, back at the office.
- Be suspicious of subjects which are attention grabbing or ‘urgent’
- Double check an email address for legitimacy
- Be extremely wary of attachments, particularly .EXE files, and
- Always check where a link is pointing before clicking.
Though all these steps may sound obvious, around 22% of all breaches still involve a phishing element.
Remember, regardless of the danger any phishing email represents, it can only require one mistake to potentially compromise an entire network.
For a more detailed guide to spotting phishing emails, check out this article on the Hutsix website: 4 Ways of Recognising Phishing Attacks in 2020
Device Security
Remote work security is not just about the digital, and at time when our behaviours and habits are required to change, we should be especially careful regarding the physical security of our devices.
Much of the time, under normal conditions, a great deal of sensitive and organisational material will remain locally stored somewhere with security and a team dedicated to its protection. Though more and more, with mobile device and remote work, we are required to take our work with us.
- Ensure devices are properly encrypted and password protected
- Never leave a device unattended
- Avoid transporting particularly sensitive or unnecessary information
- Have remote wiping capabilities in place.
Again, with these responsibilities falling upon the individual, it is vital that the lessons learnt from this experience, are not simply forgotten when the situation begins to return to normality, and remote work security becomes part of a wider security culture.
The future of hmeworking security
The longer that many of us work from home, it is hoped that much of this will become second nature. However, there is also a risk that complacency may lead to data breaches in the future. As such, it is more important than ever when homeworking that you remain diligent and cautious about the risks.
This article has been adapted from an orginial post by Hutsix.io.