5 Ways Remote Workers Can Remain Secure
Threat Actors are More Active Than Ever
As we discussed in a previous blog, threat actors (i.e. hackers) are attacking with increased intensity and repetition. Because many businesses have had to send their employees home, threat actors have begun infiltrating companies via their remote employees.
The amount of reported phishing emails has gone up a staggering 600% and Google has identified hundreds of virus type websites masquerading as COVID-19 information websites. With the risk of a security breach at an all-time high, we have provided a list of five recommendations you and your remote workers can implement to remain secure.
#1: Everyone in Your Household Should Practice Good Cyber Hygiene
All preceding recommendations are connected to this one, as they all are ways to practice good cyber hygiene. However, it is not enough for you alone to apply these practices. Everyone in your household is at risk of having their devices infected. Threat actors will deliberately target children related websites – like Minecraft – in order to piggyback from the child’s device to the employee’s and then to the company’s network.
#2: Patch/ Update All of Your Devices
Make sure all of your devices are updated and patched to their latest versions. Whenever a company, like Apple, offers an update for one of its devices, it usually contains the means to block a previously exposed exploit. An exploit is a malicious application or script that can be used to take advantage of your device or machine.
#3: Use Strong Passwords on All of Your Devices
Quite often, threat actors can enter into an environment because of poor passwords. If your username is admin and your password is admin, the time has come for some changes.
#4: Use a VPN
A VPN is a Virtual Private Network that allows the user to remain anonymous. Cybersecurity professionals often recommend people set up a VPN whenever they are working remotely or traveling.
#5: Deploy Vulnerability Scans and Penetration Testing
This recommendation applies more to the owners and operators of a business and its network. A vulnerability scan will reveal which endpoints are most at risk within your network, while penetration testing will expose if a threat actor could get inside your system via the internet. More frequently than not, businesses or governmental entities that have been breached had not made a habit of utilizing these two forms of testing.
If you are concerned about the security of your business Conectrix can help. With over 250 suppliers, we have the means to find the right cybersecurity fit for your company.