5 Simple Steps to Prevent Cyber Breaches While Working Remote
For the past month, most people who can work remotely are working remotely. The Coronavirus has increased remote work which is also increasing cyber threats. Many businesses were not prepared for employees to use their own devices and work in this shelter in place environment so quickly. Here are five simple steps to help protect you when working from home.
Ensure your network, software, and applications are up-to-date. This is one of the easiest and fastest ways to keep out cyber intruders. Remote access technologies have known vulnerabilities – and are all too often the weak link that bad actors use to gain access to protected information. Make sure all software and applications are updated and patch any weaknesses that are identified. Go to the setting in your applications to update the software or check the appropriate field to make sure updates are automatic.
Only connect to the internet through a secure network. When connected to a public network, any information you share online or via a mobile app could be accessed by someone else. Always use a Virtual Private Network (VPN) to encrypt your activity. Most organizations provide a VPN to their employees to ensure secure, remote access for work use, and personal VPN accounts are available from various service providers.
Use strong passwords. Many people use the same or similar version of a password for everything, even between work and home. Unfortunately, this means a single stolen password can be reused on multiple sites to unlock dozens of accounts for hackers. Remembering secure and complex passwords for every account can be difficult, if not impossible. Use password management software to ensure you have strong, unique passwords for everything because passwords are the foundation of sound online security practices. Many sites use dual-factor authentication which adds security and help for the occasional forgotten password.
Only click on links, open attachments, and download software from trusted resources. Most people want to stay informed with the latest information, especially during periods of uncertainty. Bad actors know this and will attempt to take advantage by masking malicious links as something informative. Once clicked, that malicious link can be used to gain access to an individual’s or organization’s private information and/or freeze their computers or networks. If you’re unsure of the source, go to the organization’s website. If it’s important, the information will be posted there as well.
Don’t respond to requests for information from unknown sources – especially if the request is for personally identifiable information or passwords. Bad actors will attempt to con people into sharing confidential information by pretending to be someone you know or work with. Take extra care in identifying who you’re sharing information with – even if you think the request came from a trusted resource or organization. Don’t feel rushed; take the time to research the request and whether it’s appropriate before responding.
Most of these tips use common sense, but can easily be overlooked. Before settling down for a long day or week of work, exchanging likely valuable information, take some time to make sure that information will be safe. It will save you a ton of time, headaches and possibly money.