6 min read
Signs Your Business Is an Easy Target for Hackers
No business is entirely immune to facing a cybersecurity incident. It may be a data breach, a case of ransomware or a...
As COVID vaccinations are rolled out, our hopes of getting ‘back to normal’ are becoming a reality. Many businesses will soon be inviting employees back to the office, however, many plan to continue working from home.
Now is a good time to check that your long-term cybersecurity arrangements are up to scratch for remote working. This means:
Download our ultimate cybersecurity remote working guide to work out if your cybersecurity is fit for purpose.
Boris Johnson has alluded that from the 21st June, the guidance to ‘work from home’ will be lifted. A survey on LinkedIn has found that an astonishing 92% plan to work from home permanently or combine office and remote working after restrictions are lifted.
If you are unsure what remote working cybersecurity controls look like or you have had to relax your security to ensure employees can work remotely, then our downloadable guide can help:
The guide explores five areas of cybersecurity for remote working:
I would recommend reevaluating what you currently do against best practise. Take a look at our 9 point guide to managing remote working risks.
Twelve months ago, businesses excelled in rapidly setting up remote working arrangements. However, long-term cybersecurity considerations weren't necessarily made while ramping up remote working. Now is the perfect time to re-evaluate your cybersecurity policy and controls.
Many of these considerations do not need huge amounts of investment, it's just as much about instilling a good cybersecurity culture into your business.
Here are seven considerations when evaluating your security policies and technology solutions:
Do you provide employees with equipment or do they use their own? Ideally employers should provide dedicated work devices – this enables you to take control of the device; what is installed and how it is set up. It can then allow you to remove access to your IT infrastructure if it is stolen or the employee hands in their notice. Employees using their own devices for work has its own set of security guidelines.
Do your employees use passwords more than once? Do you use two factor authentication as an extra barrier?
Do your employees allow family members to use work devices? They shouldn’t! You may need to update your security policy or provide your staff with training on remote working cybersecurity and best practise.
Do you activate passwords when arranging and holding meetings?
Are your employees using a VPN while remote working? Have you checked?
Imagine an email posing to be from your business’ HR asking to confirm sensitive data. Would your team respond or click on a spam link? You may have to wait 200+ days to find out that your IT infrastructure has been compromised – the average time it takes to spot a cyber-attack. Your team may need training to approach all emails and invites with precaution.
Have you found safe cloud computing solutions for a long-term and secure solution? Cloud servers, cloud telephone systems and monthly SaaS subscriptions - there are many technology solutions available that enable collaborative and secure working.
Download our guide for more guidance:
It looks like many employers and employees are seeking flexible home-office arrangement. With many tech companies having already agreed for staff to work from home permanently, such as Microsoft and Facebook, this practise may continue to be adopted more widely. Other businesses have enabled employees to work from home for a number of days a week.
It seems both employees and employers have found benefits from working from home, namely:
6 min read
May 25, 2022 James Cash
No business is entirely immune to facing a cybersecurity incident. It may be a data breach, a case of ransomware or a...
15 min read
May 19, 2022 Katherine Garratt
{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False,...
3 min read
May 13, 2022 Katherine Garratt
Responding to Increased Cyber Threats Following the Ukraine Invasion Thu 30th June 2022Virtual networking event
...