Security Considerations for a WFH POLICY
With 2020 there’s nothing good happening across the globe as COVID-19 pandemic has turned the so called “best Hollywood sci-fi movies” into reality.
Besides, 2020 social distancing orders and quarantines, as remote work appears to be the new standard — tech companies need to make sure that their employees are staying safe online.
In our office, we likely had internet security measures in place and employees are regularly on the dangers of phishing and other scams. However, now that almost most of the IT employees are switching to permanent WFH, it’s very important that we should create a secure cyberspace.
Follow these 4 quick simple Cyber security tips to keep your company data safe-
- Update software regularly
Obviously, updating softwares & applications on a regular basis can’t keep cybercriminal eyes away from exploiting vulnerabilities in your system. But you should know that in the latest versions of programs vulnerabilities are usually patched, thereby slowing down the chances of risk.
- Use a VPN if connecting to Wi-Fi networks that don’t belong to you.
Public Wi-Fi networks are often not encrypted at all, and even if they are, anyone can easily crack the password in case it is enabled. When you’re connected through a Virtual Private Network(VPN), all of your data will be encrypted regardless of the network settings, and no one will be able to get hold of it or read it.
- Do not open unknown Email Attachments.
If you’re not familiar with the sender, please do not download or execute any files or attachments sent with the email.
Email scammers of this sort will try to steal sensitive data of your’s like names, financial log-ins, or other sensitive information.
Coronavirus scams are on the rise. Be aware of all the security measures you should take while working from Home.
- Use multi-factor identification
Multi-factor identification, or MFI requires you to provide at least two forms of verification before accessing the actual data or site. Forms of identification may include fingerprints, tokens, passwords, and codes that are sent to your registered phone numbers or email addresses.
Also, termed as Muti-factor authentication (MFA), creates multiple layers of security to make sure that the user “you” requesting access is actually who they “you” claim to be. With MFA, a cybercriminal may steal one credential but will be prevented from verifying identity of the actual user.