Navigating Indispensable Cybersecurity Practices for Hybrid Working Professionals
2024-8-2 13:37:38 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

The pandemic forced people and companies around the world to adjust to remote work, and when the lockdowns ended, many employees simply did not want to return to offices. In 2022, Gartner found that 60% of knowledge workers were remote, with at least 18% opting not to return to the office.

The lockdowns also drove a huge increase in cyberattacks aimed at exploiting the trend — a 238% increase according to Alliance Virtual Offices. Of major concern were remote work security and increasing use of the cloud. These factors have made cybersecurity for remote workers a major priority in every industry.

A solid cybersecurity program can help prevent cyberattacks, protect networks and communication and give both employers and employees peace of mind. These measures have become essential for remote and hybrid workers.

Cybersecurity Risks for Remote Workers

One of the first security problems caused by remote workers is unprotected devices and home networks. The level of security needed for typical home internet is far less than what companies require.

Among the cyberattacks that workers and companies face as a result are:

  • Phishing attacks.
  • Data breaches.
  • Ransomware attacks.
  • Webcam hacking.
  • Virus and malware that spread to company systems.

Causes of Remote Security Risks

On the enterprise level, IT staff implement security protocols such as firewalls, antivirus/anti-malware programs and VPNs to protect company systems. When workers go remote, their work enters an entirely new world. Security experts cite problems such as:

  1. Unsecured networks: Today people love to work from their local coffee shops, where they can enjoy lattes with free public Wi-Fi — but public Wi-Fi is not secure. Data passed between their laptop and the router is not safe. VPNs or ZTA should be used whenever employees are accessing company systems remotely.
  2. Poor cybersecurity awareness: People are often less vigilant at home than in the office.
  3. Device management: Remote workers may rotate between desktops, laptops, tablets and phones to access company data, posing risks of possible data breaches.
  4. Missed system updates: IT departments typically institute system updates (such as Windows) as soon as they are available, whereas home users will often delay updating as long as possible, often then getting angry at the software maker for the inconvenience. But these system updates provide ongoing security patches created to combat emerging threats and are therefore a must.
  5. Data storage: Whenever data is stored on home computers or personal laptops, there is an extra layer of security risk. The devices may not have adequate security measures set up, and they may be stolen.
  6. Staff turnover: When employees leave a company, they may have sensitive data on their devices.
  7. Limited monitoring: Away from the office, employees have little or no monitoring of their online activities. They may be visiting insecure and malicious websites — something companies monitor for in-house workers.
  8. Cloud security: Cloud providers usually offer security features, but those may not be up to standard for sensitive data.

Best Practices for Companies and Remote Workers

The virtual workplace should be no less secure than the in-house workplace; in fact, it should probably be more secure. Safeguarding the virtual workplace is a shared responsibility between the employer and the worker. Here are the best practices both sides should discuss and understand:

Cybersecurity training: You can’t turn your bookkeeper or ad rep into an IT expert, but all remote workers should have a basic understanding of cybersecurity. This training should include:

  • Ensuring home wireless networks are secured and understanding the risks of public networks.
  • The need to update devices’ operating systems as soon as possible to get the latest security patches.
  • How to recognize phishing and other cyberattacks.
  • Protocols on how and where to store data and files.

Use multi-factor authentication: MFA requires users to provide two or more verification factors to gain access to systems and resources. For example, some banks may require customers logging onto via PC to use both a password and a passcode sent by email or text. Microsoft touts MFAs as blocking nearly all account hacks.

ZTA and data encryption: Many enterprise companies require employees to ensure data security when logging onto company systems. Data encryption protocols are implemented to safeguard data transmitted to and from devices, protecting it from unauthorized access. It’s advisable to maintain stringent security measures when accessing home or public networks.

Use secure videoconferencing platforms: For all company meetings, use secure video and messaging platforms to avoid hacking.

Stick with company email systems: When working remotely, keep all work-related emails on company systems. This may be necessary for compliance issues as well as for security. Both the company and the remote workers should understand the importance of this.

Consider zero-trust security: Zero-trust security ensures constantly that everything behind the company firewall is safe, verifying identities, devices, networks, and applications.

Best Practices for Remote Workers

Install antivirus and security software on all devices and be sure to update it regularly.

Ensure your home or remote Wi-Fi network is secure, and never use public wireless networks such as at hotels and restaurants without implementing appropriate ZTA measures. Ideally, employ ZTA even within your home network.

Learn and utilize the basics of strong passwords, and never share work passwords with others.

Be extra cautious with incoming emails. Learn to recognize scams, and whenever in doubt, don’t open an email. Whenever you do, don’t click on links from unknown senders. Remember that even known senders may have had their email hacked and used to send out malicious messages.

Use a webcam cover or unplug your webcam when it’s not in use. And remember, hacked webcam software has access to audio, as well as video.

Remote and hybrid work offers employees and companies numerous benefits, including flexibility, increased productivity, access to a global talent pool and cost savings, among others. By investing time in training and preparation, both sides can easily avoid associated pitfalls and take full advantage of the flexibility that technology provides.


文章来源: https://securityboulevard.com/2024/08/navigating-indispensable-cybersecurity-practices-for-hybrid-working-professionals/
如有侵权请联系:admin#unsafe.sh