1 / 5

Best Cyber Security Tips for Remote Workers

Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.<br>u00b7 Information security protects the integrity and privacy of data, both in storage and in transit.

6875
Download Presentation

Best Cyber Security Tips for Remote Workers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Best Cyber Security Tips for Remote Workers-ICSS What is Cyber Security? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. · Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

  2. · Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. · Information security protects the integrity and privacy of data, both in storage and in transit. · Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella. · Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources. · End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various

  3. other important lessons is vital for the security of any organization. Best Cyber Security Tips for Remote Workers 1. Be on the lookout for phishing emails Cyber criminals are taking advantage of the COVID-19 situation and are crafting emails to target remote workers to steal their personal information or gain access to business email accounts. Understand the signs of a phishing email (bad grammar, unknown sender email address, etc.) Don’t click on any links in emails without verifying the link address first. Don’t provide any of your personal information or login credentials in response to any email requesting it. 2. Use encrypted communication There may be times where you need to send sensitive information to your coworkers. If your company doesn’t provide you with a secure method for sending sensitive information, use an application that utilizes end-to-end encryption, such as Telegram or WhatsApp. 3. Be cautious when using remote desktop tools Many employers will allow employees to connect to their work network using a Remote Desktop Protocol (RDP). While RDP can be secure, be aware that there are some security problems with common RDP tools for Windows and Linux. If you are

  4. given the option to choose your RDP service, select from one of these recommended RDP tools, many of which offer a free trial. 4. Use a VPN when connecting to your work network VPNs provide a secure tunnel for the information to pass between your device on your home network to your work network. It is especially important to use a VPN when accessing any of your organizations file servers to maintain the integrity and confidentiality of your data.5. Ensure your home network isn’t an easy target 5. Ensure your home network isn’t an easy target Verify your anti-virus software is running and is updated to include the newest malware signatures. Secure your home internet with a firewall to prevent any unwanted connections. Install any patches and make sure your systems are up to date. Strengthen your passwords and always use multi-factor authentication (MFA) when available. 6. Make sure your WiFi network is secure Taking the extra time to change the default SSID and password on your Wifi network is a small step that goes a long way to being securing from hackers. Regularly update your router to address security vulnerabilities in the firmware.

  5. 7. Consider moving your work devices to a separate subnetwork It’s likely other members of your family are also being forced to remain at home, and they could be spending their time browsing the internet. During this time, they may be more susceptible to accidentally downloading a virus that can infect the entire network you are now trying to work on. Take inventory of the devices you use for work, and create a separate virtual network so that you are not on the same network as the rest of your family. Many routers offer the option to create these virtual networks.

More Related