CyZen: [COVID-19] Five Ways to Keep Your Remote Workforce Cyber-Secure

March 18, 2020 |

In a national effort to curtail the spread of COVID-19, we are witnessing the rise of the remote workforce. While companies are focusing on ways to protect their employees, clients and families, cyber attackers are infiltrating insecure cybersecurity postures.

CyZen’s advisors have been closely monitoring the rise in COVID-19-related cyber-attacks. Our experts have witnessed spearphishing campaigns and new forms of malware being spread through documents using the name, “coronavirus.” Knowing that largescale telecommuting is uncharted territory for many organizations, we assembled steps you can take right now to secure your data across remote devices:

(1) Implement endpoint detection. Most threats rely on stealing employees’ credentials and malware. Endpoint detection software increases visibility and creates alerts to help add reactive responses to threats in real time.

(2) Keep work data on professional devices. It may be tempting to use your personal devices for work; however, it increases the risk of an attack. Hackers can bypass security safeguards your company’s IT has in place.

(3) Ensure that all VPN and remote work applications are patched/updated and utilize two-factor authentication. The biggest threat outside of user threats is your internet-facing infrastructure. There are often vulnerabilities an attacker can exploit. Be diligent in ensuring that your team is catching these patches and updating as soon as they are released.

(4) Encrypt sensitive files when sharing between team members. Whether it’s on slack/teams, email, or any other file sharing software, use password-protect files only.

(5) Educate your employees on cybersecurity best practices. Train and test your employees on cybersecurity policies on a regular basis. Teach your employees how to tell the difference between official communications and phishing campaigns that resemble CDC/coronavirus email alerts. Formalize and document remote work policies in an easily accessible location.

Unfortunately, cyber-attackers thrive by capitalizing on mayhem and uncertainty. However, there are clear precautions you can take to safeguard your valuable data without diverting your attention from what matters most—keeping your employees and clients safe and driving your business forward.

AUTHORS:
Jake Lehmann, Managing Director

Compliments of CyZen – a member of the EACCNY.