The remote working environment increases the risk of data leaks and cyber attacks due to the increase in the area to be protected, the vulnerability of network and cloud infrastructures, and the lack of digital skills and work habits of employees. This was told to socialbites.ca in Roskachestvo and they also gave advice on cybersecurity in a remote location.
For those who work remotely on a computer, the first thing to do is to install a modern operating system (OS) and update it in a timely manner. For example, the latest version of any operating system includes security options enabled by default to help prevent common types of attacks.
The second recommendation is to buy an up-to-date router that is a gateway to your home network and forwards packets between its various segments according to routing rules.
“Check with the provider if the router has been updated to the latest version and replace it if the equipment is nearing the end of its service life. The use of an old router can affect the speed of work, ”said Sergey Kuzmenko, head of information security of the Roskachestvo Center for Digital Expertise.
Roskachestvo said it doesn’t hurt to make sure the router supports basic firewall features and network address translation (NAT) to prevent internal systems from being scanned across the network boundary.
“Install software to ensure information security. If possible, enable full disk encryption on all devices. Roskachestvo specialist noted that special software that is already built into the operating system or can be installed as an application will help in this matter.
The organization says it’s important to protect passwords and security questions. It should not be stored in plain text in a notebook on the desktop – real and virtual. It’s better to use a password manager as it creates unique, complex passwords and saves them without having to remember them.
It is required for security and restricts the use of the administrator account. Otherwise, if the malware infiltrates the device while the user is logged in as an administrator, it can gain access to a large number of files.
“For normal, everyday activities such as web browsing, accessing email and working with files, it is worth creating an unprivileged user account. The administrator account should only be used for device maintenance, setup and updates,” Sergey Kuzmenko suggested.
He noted that the use of personal accounts and resources for business interaction should also be avoided. Therefore, for work outside the office, it is worth using the equipment and accounts provided by the organization, without mixing personal and business content.
“Remember that all smart devices have ears and microphones. Gadgets listen to conversations even when we’re not interacting directly. To avoid compromise, limit sensitive conversations to baby monitors, sound-recording toys, household aids, and other smart devices. By the way, it will also not be superfluous to seal the camera. Turn off the microphone and internet access when you are not using the devices. Do not forget to upload all updates to a new link,” concluded the head of information security of the Roskachestvo Center for Digital Expertise.
previous survey showed60% of Russians enjoy communicating with their superiors on non-business matters.