Remote work is here to stay for the foreseeable future
If you don’t have a cybersecurity strategy in place, it’s time to protect your remote workers against hackers now.
The coronavirus pandemic caught many of us off-guard with no time to prepare for embracing remote work. We get that. But going forward, it’s important to have a cohesive strategy in place to protect remote workers. Why? Because cybercriminals are taking advantage of this difficult time – launching more attacks than ever before that leverage fear, uncertainty, and of course, the less secure remote work environment most of us are in.
Even those that will get back into the office as lockdowns are lifted will continue to embrace remote work to some degree – with employees working from home, hotels, and public transport at times. If you don’t have a cybersecurity strategy in place, here’s our checklist for protecting remote workers against hackers:
Implement endpoint protection on devices
Mobile devices, computers, and laptops should be secured with proper endpoint protection, including anti-virus software, encryption, and a mobile device management application that allows you to wipe equipment if it’s lost.
Use strong, hard-to-guess passwords
A strong, hard-to-guess password should be used for each account or service. This means a minimum of 12 characters with a mix of numbers, letters, and symbols. Passwords should be changed every 90 days.
Enable multi-factor authentication wherever possible
The majority of online accounts and services offer multi-factor authentication nowadays, including a lot of social media platforms, online banking services, and cloud solutions. Make sure they’re enabled to add an extra layer of protection.
Use an enterprise-grade collaboration platform
There are tons of options when it comes to video conferencing and instant messaging tools, but make sure you’re using an enterprise-grade collaboration platform, such as Microsoft 365, which includes Microsoft Teams, rather than a free option with minimal security features.
Avoid using public wireless networks
Public wireless networks tend to be less secure and more vulnerable to attacks. If possible, avoid using public wireless networks to access sensitive information. If necessary, use a virtual private network to connect.
Understand the signs of malicious activity
When working from home, employees need to know the signs of malicious activity, such as emails with spelling and grammar errors, a sense of urgency, or slight differences in the website or email domain compared to the legitimate organization they’re portraying.
Be careful with removable devices
USB sticks and other removable devices can carry malware over to your computer or laptop. Be very careful with any sort of removable device, and if possible, use a separate device to plug it in rather than the device you work on.
Need help implementing security measures to protect remote workers? Get in touch with us—call (416) 256-9928 for more information.
Tektonic Managed Services is an IT Support and Computer Services company serving Toronto GTA. We provide services in and around Toronto, including York Region, Durham Region and Peel Region. Businesses like yours need technology support to run highly-effective organizations. Leverage pro-growth technology services for your company now!