Why putting measures in place to keep data safe as employees rejoin their company’s network should be a number one top priority.
As lockdown eases, many businesses are preparing for employees to return to work. But are their corporate networks ready, with adequate security measures in place, to ensure their systems are protected from the increased risk of a cyber attack owing to staff and their equipment working from home?
Cybercriminals are well aware of employee environments and will target cyber attacks in areas that have become vulnerable. We saw this with the spike of phishing attacks themed around working from home and it will continue to evolve as workforces change their work practice once again.
When remote working descended upon the nation strong and fast earlier this year, some organizations were able to issue company standard devices with regularly patched antivirus security. However, for the majority, there was a frenzy to equip their staff with the required machines to enable a quick and adequate ‘working from home’ set up. As we now raise our heads above the parapet, we are seeing an abundance of employee hardware lacking necessary security and about to connect to their company’s corporate network, risking sensitive data being exposed to a cyber attack.
Computers used for remote working are likely to have confidential company data stored, have been shared with family members possibly visiting insecure websites, or installing insecure software for example, with no guarantee that they have been patched and maintained over these recent months. The big question is: can these external devices be trusted back on to the corporate network?
Businesses need to carry our risk assessments and put best practices in place before their networks are exposed. Firstly, the staff needs to share where company data has been saved and under which accounts, work, or private credentials. Was it a public cloud environment like google drive, one drive, dropbox? This all needs to be disclosed to minimize risk, ensure data is safe and GDPR compliance is maintained.
Secondly, if employees have been sharing the devices with their house members, have they given away their password? Is the password the same across work accounts and personal accounts? What new software has been installed or removed and by whom? Were there any security warnings such as viruses being detected by anti-virus software? Has any confidential paperwork been printed at home and has it been shredded or dropped in the bin? Where employees have access to sensitive information, questions need to be answered before they rejoin an organization’s network.
If a company allows all machines back onto their corporate network, they will need to rely on network monitoring and most critically, they will need to monitor the activities of the people within the network. It is the people who pose the greatest business risk if they have not got ongoing support in terms of cybersecurity awareness training. They are operating from within a company’s network on a daily basis, sending and receiving data through a multitude of access points. If left untrained, employees are a hackers haven, an easy access point to the entire network, surpassing any technological measures in place to keep them out. If trained, employees are your greatest line of defense – your Human Firewall.
There are various types of cybersecurity awareness available, but the idea is to combine interactive cybersecurity awareness training content with a software solution that works hand in hand with your company’s IT infrastructure. Cyber Risk Aware offers “real-time” intervention training, which identifies where employees are making mistakes and send focused training material to help improve their behaviors, saving both money and time. Building a Human Firewall is the biggest defense against cyber attacks.
About Stephen Burke – CEO and Co-Founder Cyber Risk Aware
Stephen founded Cyber Risk Aware in 2016, after a career spanning over 20 years in technology and security specializing as a CISO. In that time he found that most if not all security incidents are caused by human error at all levels in an organization, no matter how good the technical defenses were. Stephen founded Cyber Risk-aware with the mission of making a genuine difference and helping companies and users at home from being victims of cybercrime.
Specialties: Security Education and Awareness Programs, Cyber Insurance, Network Security, Data Governance and Security, Malware Investigator and Incident Response, Risk Management, Security Behaviour Analytics. Security Architecture, Heuristic Security, Security Audit, Digital Forensics, Penetration Testing, Encryption, Wireless security, Security management, Database as a Service, Internal Cloud Design, SAN Design, RDBMS Virtualisation and Consolidation, Disaster Recovery.