After the corona virus, many international organizations allow people to work from home to reduce the risk of infection. But does this make sense from a cyber security perspective? While companies generally have a cyber security policy that regulates the use of antivirus and firewall protection, people without technical knowledge could fall victim to cybercriminals.
I have been a supporter of home work since the mid-1990s, when it was called telework. I was self-employed and worked on a four-year project for the European Commission. Our virtual company called Telework Europe has been commissioned by the European Commission to investigate the emerging Internet technologies and how they can benefit the geographically disadvantaged Eurospeak for those who are stuck in the hereafter outside of the main areas of employment.
Not working from home again
“Working from home or online education programs are not new. However, a large, instant migration of people from tightly monitored and secured corporate and university networks to largely unmonitored and often unsecured home Wi-Fi networks creates a very large target for cybercriminals, “said Chris Hazelton, Security Director Solutions at Lookout, said. “These users are out of the reach of perimeter-based security tools and are likely to be more exposed to phishing and network attacks.”
How can organizations support this transition with their employees?
First, Microsoft does not support Windows 7 and higher and the latest security patches have not been installed, so hackers have an open gateway. Apple devices are generally considered safer, although hackers are trying to crack the Apple kit.
Second, you should work from home to allow your IT department to check the software on their computers to alert them to unsafe software.
Third, you should inform staff about the dangers of unsolicited email, especially if you use Corvid-19 as bait to get people to open it. These phishing scams will spread malware to users’ systems.
Third, make sure that employees have the latest security software on their computers. Antivirus and anti-malware vendors have bulk licensing facilities. Your IT department will advise you on the corporate AV used by the company. So compatibility is a good idea.
Fourthly, the use of a VPN is recommended because it encrypts all traffic from employees’ home computers and provides an additional layer of security. Don’t use free VPNs. These are generally considered unsafe and are known to data mine computers or plant malware. Again, your IT team will provide a list of recommended providers.
Fifthly, home WiFi and mobile devices as well as connected computers from drive-by or hackers can be accessed in the immediate vicinity. Let employees install an app that tells them which computers and devices are accessing their home Wi-Fi network, and block these unrecognized devices.
Sixth, try installing a high level of common sense at home as all the vulnerabilities you ignore can affect your company’s computer infrastructure.
Note: We are not the author of this content. For the Authentic and complete version,
Check its Original Source