Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • How to Protect Your Remote Workforce from a Cyberattack
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

How to Protect Your Remote Workforce from a Cyberattack

4 years ago Tripwire Guest Authors
How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.

In addition, there is a worldwide shortage of cybersecurity professionals in every industry. The investment in educated cybersecurity professionals is vital to protecting your remote workforce from a cyberattack. They can help put an updated cybersecurity strategy in place, and train employees about staying safe online and so much more. 

Reassess Your Cybersecurity Strategy

Cybercriminals are constantly evolving their tactics, and businesses need to keep up with security measures. There are even more vulnerabilities with a remote workforce, such as the use of personal devices, and working on unsecured networks. Organizations must update their cybersecurity strategy continually to stay current. As stated in the TechTarget guide, a cybersecurity strategy “is a high-level plan for how your organization will secure its assets during the next three to five years.”

The first step to building a cybersecurity strategy is assessing the threat landscape. Then, assess your current strategy — determine if you have the right programs and applications to protect your employees. Is your IT team able to execute an effective strategy with the resources they’re allocated? Once you have a clear picture of your current status, you can explore ways to update and improve your cybersecurity strategy, ideally focusing as much or more on preventing possible cybercrimes than reacting to them. Make sure to document your strategy and update all pertinent employees. Don’t forget — part of your cybersecurity strategy should be training for your employees.

Employee Cybersecurity Training

There are a variety of free and paid cybersecurity employee training programs available, both online and in-person. Cybersecurity training should be ongoing for your entire team and should be part of the orientation process for new employees. Ongoing training should include, but not be limited to education about:

  • Types of security threats (malware, phishing, ransomware).
  • Password management and security.
  • Malicious links.
  • Logging on from a personal device or a device outside the network.
  • How to spot suspicious behavior.
  • What to do if they suspect they have been targeted by a cybercriminal.

Implement Remote Desktop Setup and Multi-Factor Authentication

To protect against the increased risks presented by remote and hybrid employees, it’s recommended for them to use a remote desktop setup, such as a VPN, and Multi-Factor Authentication (MFA). With MFA, a user must provide two or more verification methods to successfully log in.  In fact, Microsoft engineers said that 99.9% of compromised accounts don’t use MFA.

Never Work on an Unsecure Network

For remote employees, “working from home” can often mean “working from a coffee shop.” When working on a secure (password protected) network, data is encrypted — as opposed to plain text data. Plain text data can be intercepted by almost anyone with basic malicious cybersecurity knowledge. Encrypting data increases security immensely. This applies to mobile devices and tablets, in addition to laptops. Even checking email on a mobile device on an unsecured network can lead to a security compromise.

Use a Zero Trust Framework

Zero trust frameworks are important, especially with remote workers. The zero trust model follows the idea that all people and devices attempting to join a network may be hostile and must be authenticated at every access point and unique activity. This includes users inside and outside of the network, and cloud-based or local users.

An IBM report states that compromised credentials were responsible for about 20% of data breaches in 2021, costing an average amount of $4.37 million per breach. The average cost of a data breach was $1.76 million less at organizations that applied a zero trust approach.

Improved Password Management and Security

You’ve heard it before, but it’s worth repeating — don’t use “password” as your password. The same goes for “password1” and “1234.” There are multiple algorithms that criminals can use to guess commonly used passwords. Here are a few password best practices:

  • Use different passwords for different logins.
  • Don’t use personal information in your password (pet or street names, or important dates).
  • Never share your password with anyone.
  • The longer the password, the harder it is to guess.
  • If you want to store passwords, do so in a secure password management system.

A cyberattack can be devastating to an organization. Protecting your remote workforce’s online activities from cybercrime must be a focus for organizations. It starts with having the right cybersecurity professionals, setting a cybersecurity plan and educating employees on staying safe when working from home. Having a plan in place can help keep your business, data and employees safe.


About the author: Michelle Moore, Ph.D., is an academic directory and professor of practice for the University of San Diego’s innovative online Master of Science in Cyber Security Operations and Leadership program. She is also a researcher and author with over two decades of private-sector and government experience as a cybersecurity expert.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” How to Protect Your Remote Workforce from a Cyberattack” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, COVID-19, Finance, High Severity, Malware, Microsoft, Phishing, Ransomware, TripWire

Continue Reading

Previous Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
Next Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of June 20, 2022

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

19 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT