Remote working: cybersecurity concerns

Silhouette Of Cropped Shot Of A Young Man Working From

Every three seconds somebody sufferidentify theft online. With the whole of the UK being put in lockdown since March, businesses have adapted to a new way of life, which includes working from homeEducating your employees on how to protect themselves and your business from a cyber-attack is extremely valuable and more relevant than ever.  

According to a new report, cybersecurity firm Malwarebytes claims 20% of businesses have suffered a breach due to the actions of a remote worker since lockdown was introduced. 

Remote Worker Security 

Pay for anti-virus protection 

The number one thing you need in place is good anti-virus software. As businesses deployed rapid home working many relied on staff using their own equipment but didn’t necessarily ensure the level and quality of virus protection on those machines. There are free anti-virus products available but as with so many other things, you get what you pay for.  

Always Use VPN 

Ensuring you are connected to a VPN (virtual private network) rather than public Wi-Fi is an important security consideration when working remotely. A VPN helps by improving your online privacy, as it encrypts all your internet traffic so that it is unreadable to anyone who attempts to intercept it. There is however a risk here if you install VPN software on unclean or unprotected devices, as the VPN creates a tunnel between the two endpoints and that tunnel can and will carry infections where they’re present. 

Read more on the dangers of public WiFi here.  

Do Not Share Sensitive Information Through Email 

When you are working from home, it is important not to let your security measures slip. For example, if you cannot get into your remote access and you need a password desperately, do not be tempted to ask one of your colleagues or send any emails yourself containing passwords. Emails are not encrypted but rather are transmitted in clear form. You could easily send an email to the wrong person, even accidentally, or it could get in the hands of the wrong person. Be sure not to risk the security of passwords and never send sensitive information over email.  

Install Updates Regularly  

In many cases, you can set updates to run automatically, often while you are sleeping, so you do not have to worry about downtime. This is important to do because updates can improve the stability of your software and get rid of outdated features, which reduce the vulnerability of your PC catching a virus.  

Set Up Two-Factor Authentication  

By setting up two up two-factor authentication, you can guarantee additional security on all your devices and accounts, this can prevent any potential targeted hackings. Two-factor authentication means when you log into your app or account, a code will be sent to your choice of source (either via text, phone, or email) and you will have to enter this code at log in. This is as great way to repel hackers away and keeping your accounts safe.  

Two factors identification

Don’t Let Anyone See Your Screen  

During online meetings, using the ‘screenshare’ function is quite common. Although this tool is very useful for remote meetings, it can also have a detrimental effect on your security. It is easy to have windows left open and before you know it everyone can see. At first, it can seem a little uncomfortable or funny to accidentally reveal harmless information. Yet, it can be a massive privacy issue and put your company at risk.  

On the other hand, when working from home you should also be mindful of those around you and those who might be able to see your screen. You might, for example, have other people working in your house, or perhaps you live with friends and they have guests over. You should always be mindful about what you leave open on your screen for others to see – it pays to be overly cautious.   

Create a Safe Working Environment 

By choosing a dedicated area at home to work from you can help yourself avoid distractionsmistakes, and accidents. These could have a detrimental effect on your cybersecurity, by staying organised and alert, ensuring no one else in your home has access to your PC (locking it when you leave it). Through the response steps above, you can ensure you’re working hard to avoid a cyber-attack while working remotely. 

Related Posts

  • The importance of cybersecurity contingency planning for businesses

    The importance of cybersecurity contingency planning for businesses

    Cybersecurity

    Protect your data from cybercriminals and minimise downtime with an effective cybersecurity contingency plan. Read on. [...]

    Read article

  • How to Spot a Scam HMRC Letter 

    How to Spot a Scam HMRC Letter 

    Cybersecurity

    Learn how to spot fraudulent communications, like fake HMRC letters, and take steps to protect your personal information and finances from scammers. [...]

    Read article

  • What is Data Loss Prevention (DLP)?

    What is Data Loss Prevention (DLP)?

    CybersecurityTechnical Blog

    Explore how Data Loss Prevention (DLP) strategies and tools protect sensitive data, ensure regulatory compliance, and mitigate risks from insider threats, enabling organisations to stay secure and resilient in [...]

    Read article

  • AI-Driven Threat Detection and Response

    AI-Driven Threat Detection and Response

    AICybersecurityTechnical Blog

    This blog explores how AI-driven cybersecurity is transforming threat detection and response with real-time, adaptive defenses against evolving cyber threats. [...]

    Read article

  • Why you should invest in Cybersecurity Consultancy

    Why you should invest in Cybersecurity Consultancy

    Cybersecurity

    n an increasingly complex cyber threat landscape, investing in cybersecurity consultancy is essential to protect your business from potential risks and ensure long-term resilience. [...]

    Read article

  • Everything you need to know about the transition to ISO 27001:2022 

    Everything you need to know about the transition to ISO 27001:2022 

    Cybersecurity

    This blog explains the essential steps and timeline for transitioning from ISO 27001:2013 to ISO 27001:2022, ensuring your organisation maintains its certification before the October 2025 deadline. [...]

    Read article

Quiz yourself

Are you more cyber savvy than an 11 year old?

11-14 year olds get asked these questions in school. Could you get these right?