perm_phone_msgHAVE AN EMERGENCY? Call: (40) 0765 279 019

Top Categories

Spotlight

todayApril 7, 2020

Cyber security + Whitepapers pMLrwRHGEC

WHY IS THE HEALTHCARE SYSTEM SO BAD AT CYBERSECURITY?

Imagine a doctor completely unaware of what they’re walking into triaging two patients: one in need of a hospital cardiac catheterization lab after an irregular electrocardiogram (EKG) reading, the other suffering from a stroke and needing a CT scan. All systems are down due to ransomware, so the physician working [...]


Train your employees to work from home safely and securely.

Cyber security + Global news Gabriel Garban todayMarch 18, 2020 31 1

Background
share close

In response to the coronavirus pandemic, organizations worldwide are implementing work-from-home policies. Yet for many businesses, managing an entirely remote workforce is completely new, which means they may lack the processes, policies and technologies that enable employees to work from home safely and securely. In addition, many employees may be unfamiliar or uncomfortable with the idea of working from home. 

Social Engineering

One of the greatest risks remote workers will face, especially in this time of both dramatic change and an environment of urgency, is social engineering attacks. Social Engineering is a psychological attack where attackers trick or fool their victims into making a mistake, which will be made easier during a time of change and confusion. The key is training people what social engineering is, how to spot the most common indicators of a social engineering attack, and what to do when they spot one. Be sure you do not focus on just email phishing attacks, but other methods to include phone calls, texting, social media or fake news.

Strong Passwords

Weak passwords continue to be one of the primary drivers for breaches on a global scale.

Updated Systems

The third risk is ensuring any technology your workforce uses is running the latest version of the operating system, applications and mobile apps. For people using personal devices this may require enabling automatic updating.

Additional topics to consider:

• Detection / Response: Do you want people reporting if they believe there has been an incident while working at home? If so, what do you want them to report and when? This will be especially critical when you have people working remotely.

• Wi-Fi: Securing your Wi-Fi access point.

• VPNs: You should use one.

• Children / Guests: Reinforce the idea that family / guests should not access work related devices

Quick Tips

• The most effective steps you can take to secure your wireless network at home is to change the default admin password, enable WPA2 encryption and use a strong password for your wireless network. • Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system.

• One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.

• Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

• Make sure each of your accounts has a separate, unique password. Can’t remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.

• Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step

Written by: Gabriel Garban

Rate it
Previous post

Similar posts

Cyber security pMLrwRHGEC / March 24, 2020

WHY SHOULD HOSPITALS AND HOSPITAL LEADERS CARE ABOUT CYBERSECURITY?

Many medical devices and other hospital assets now access the Internet – both in encrypted and unencrypted fashion. Billing systems use electronic transfers, medical devices upload vital statistics in real time to electronic health records, hospitals allow patients and visitors access to hospital WiFi, patients are being provided access to protected health information (PHI) via ...

Read more trending_flat

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *