{"id":1816,"date":"2022-08-21T19:32:50","date_gmt":"2022-08-22T02:32:50","guid":{"rendered":"https:\/\/www.wowrack.com\/blog\/?p=1816"},"modified":"2024-05-16T10:28:46","modified_gmt":"2024-05-16T03:28:46","slug":"remote-working-top-5-cyber-security-risks-and-tips","status":"publish","type":"post","link":"https:\/\/www.wowrack.com\/en-us\/blog\/security\/remote-working-top-5-cyber-security-risks-and-tips\/","title":{"rendered":"Remote Working: Top 5 Cyber Security Risks and Tips"},"content":{"rendered":"\r\n<p>Working from home or remote working has become a trend that continues to flourish even as the pandemic winds down, as workers prefer to work from home. Aside from increased benefits, working remote also brings risks that employees must face when working in an unsecured cyber environment.<\/p>\r\n\r\n\r\n\r\n<p>The growing number of companies opening opportunities for their employees to work remotely has seen an increase in malicious exploitations of vulnerabilities in their organizations. Access from unsecured networks, usage of personal devices, sharing of passwords, and lack of cybersecurity awareness are seemingly small actions that give opportunities for attackers to target sensitive information and critical systems.<\/p>\r\n\r\n\r\n\r\n<p><strong>Read More: Impact of Rising Cyber Attack on Businesses Operation<\/strong><\/p>\r\n\r\n\r\n\r\n<p><strong>Wowrack<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Wowrack has implemented a hybrid working policy, with some of our employees working fully remote until now. We know a thing or two about the difficulties of securing our infrastructures from these digital attacks. We are also developing advanced features and software for end-users to detect these digital attacks.<\/p>\r\n\r\n\r\n\r\n<p>Here are the top 5 risks and tips on how to help you in the event a possible cybersecurity exploit might target you while working remotely and how you can prevent them from happening.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"htoc-cybersecurity-risk-1-passwords\"><strong>Cybersecurity risk #1: Passwords<\/strong><\/h2>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"htoc-using-the-same-password-for-every-account\"><strong>Using the same password for every account<\/strong><\/h3>\r\n\r\n\r\n\r\n<p>This increases the risk of getting all your accounts stolen once an attacker manages to log in to even one of your accounts. Getting your accounts stolen could also lead to giving the attacker access to sensitive information.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"htoc-using-overly-simple-and-obvious-passwords\"><strong>Using overly simple and obvious passwords<\/strong><\/h3>\r\n\r\n\r\n\r\n<p>Never make easy-to-guess passwords. This includes your name, username, birthday,12345, qwerty, etc.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\" id=\"htoc-password-sharing\"><strong>Password-sharing<\/strong><\/h3>\r\n\r\n\r\n\r\n<p>Since remote workers often work at cafes, hotels, and public spaces, it is common to want to write down those passwords on post-it notes or loose paper. The problem arises when you happen to forget about it. People who stumble upon your post-it note would have access to your account could take advantage and steal your credentials.<\/p>\r\n\r\n\r\n\r\n<p>How to tackle it:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\" type=\"1\">\r\n<li><strong>Use a password manager tool<\/strong><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>Password manager tools like 1Password and LastPass can help you come up with complex and unique passwords for each of your accounts, and you do not have to write them all down as all you need to do is open their digital vault to view those passwords whenever you need them.<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Never share your password with anyone<\/strong><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>This includes your family members, friends, and co-workers, as they might also login using your credentials on their unprotected devices, which as a result increases your account vulnerability to getting attacked by hackers.<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Update your passwords regularly<\/strong><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>This reduces your risk of someone else gaining access to your accounts, as someone might find your old passwords when you change or sell your old devices.<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Use Multi-Factor Authentication (MFA)<\/strong><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>Setting up Multi-Factor Authentication (MFA) means adding a verification step to sign into an account or make transactions. This makes having only your password inadequate for hackers or attackers to access your accounts. This requires you to enter a one-time password (OTP) in addition to your original password. The OTP can be sent to you via text message, or you can retrieve an OTP via MFA apps such as Google Authenticator, Microsoft Authenticator, or Authy.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"htoc-cybersecurity-risk-2-unsecure-networks\"><strong>Cybersecurity risk #2: Unsecure Networks<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Remote working gives workers the option to work from their homes, cafes, libraries\u2014 anywhere there is Wi-Fi. Employees access their company\u2019s sensitive information while connecting to the unsecured network. This could result in their connection being vulnerable to what is referred to as a Man in the Middle attacks (MITM), as a lot of public Wi-Fi networks are poorly encrypted or not encrypted at all. This means a perpetrator is actively routing your data\u2014 essentially eavesdropping and interrupting your data when you surf the web.<\/p>\r\n\r\n\r\n\r\n<p>How to protect yourself:<\/p>\r\n\r\n\r\n\r\n<p>Connecting to a virtual private network (VPN) can help you prevent being the target of a MITM attack. The VPN encrypts your connection in a way that your data will go through the VPN servers instead of the internet service provider. In this process, your IP address is altered, hiding your true online identity from prying eyes.<\/p>\r\n\r\n\r\n\r\n<p>Nowadays, companies provide VPNs for their employees to utilize. This can only be accessed by their employees as it requires them to insert their username, password, or OTP to be able to use it.<\/p>\r\n\r\n\r\n\r\n<p>Want to set up or manage a VPN for your company to utilize? Check out <a href=\"https:\/\/www.wowrack.com\/en-us\/service\/managed-services\/\"><strong>Wowrack's Managed Solutions<\/strong><\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"htoc-cybersecurity-risk-3-inadequate-security-reviews\"><strong>Cybersecurity risk #3: Inadequate Security Reviews<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>A common mistake that many companies still make is not considering their security posture. A company\u2019s security posture is the overall readiness to tackle challenges related to cybersecurity. This includes loss of data due to cyber-attacks, ransomware, data breaches, and other cyber threats. Inadequate review of their security posturing could lead to unreadiness to face the ever-changing landscape of cybersecurity threats. This impacts not only the IT department but the organization as a whole.<\/p>\r\n\r\n\r\n\r\n<p>How to solve it:<\/p>\r\n\r\n\r\n\r\n<p>Start developing a habit of regularly reviewing your company\u2019s cybersecurity posture. This way, you can know in which specific areas your company needs to improve to strengthen your cybersecurity posture. If these are implemented properly, it can reduce your cybersecurity risk.<\/p>\r\n\r\n\r\n\r\n<p><strong><a href=\"https:\/\/www.wowrack.com\/en-us\/service\/security-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security services providers<\/a><\/strong> can also help provide you with cybersecurity metrics to help you with measuring your cybersecurity posture. They\u2019ll assist in the reviewing process and can help give you insightful advice on how to improve your cybersecurity posture.<\/p>\r\n\r\n\r\n\r\n<p><strong>Read More: Security Operations: The Solution for Modern Cybersecurity Needs<\/strong><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"htoc-cybersecurity-risk-4-ransomware\"><strong>Cybersecurity risk #4: Ransomware<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>According to the 2022 <a href=\"https:\/\/www.sonicwall.com\/2022-cyber-threat-report\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cyber Threat Report by SonicWall<\/a>, ransomware attacks worldwide have increased by 105% in 2021. Remote workers need to be aware of this trend to avoid falling trapped into phishing emails, as it is one of the easiest ways for attackers to infiltrate the company\u2019s network. Once a company\u2019s system is attacked by ransomware, the company might have to pay a hefty sum to get its data back or to prevent it from being leaked. There is also no guarantee that the company can ever get its data back post-attack.<\/p>\r\n\r\n\r\n\r\n<p>How to prevent it:<\/p>\r\n\r\n\r\n\r\n<p>Aside from providing their employees with proper training about how to avoid phishing scams, businesses need to also invest in backup software that can quickly and reliably backup and restore all their data whenever needed. Veeam is an example of backup software that we utilize and <strong>offer at Wowrack<\/strong>. Aside from backup software, we also recommend businesses invest in security software that can prevent their employees from clicking on suspicious links or websites before they reach the company\u2019s network or any endpoints even when the employees are not connected to the company\u2019s network, such as using the Cisco Umbrella.<\/p>\r\n\r\n\r\n\r\n<p><strong>Read More: <a href=\"https:\/\/www.wowrack.com\/blog\/4-steps-to-protect-backup-from-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">4 Steps to Protect Backup from Ransomware<\/a><\/strong><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"htoc-cybersecurity-risk-5-lack-of-cybersecurity-awareness\"><strong>Cybersecurity risk #5: Lack of Cybersecurity Awareness<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>According to a <a href=\"https:\/\/www.unisys.com\/siteassets\/microsites\/unisys-security-index-2021\/report-usi-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">survey by Unisys in 2021<\/a>, 61% of hybrid and remote workers claimed that they are cautious about clicking links in text messages, emails, or social applications. However, only 44% are aware of SMS phishing. This shows that there are a lot of remote workers who still lack awareness about cybersecurity.<\/p>\r\n\r\n\r\n\r\n<p>Parallel to that, in a <a href=\"https:\/\/www.talentlms.com\/blog\/cybersecurity-statistics-survey\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2021 survey held by TalentLMS and Kenna Security<\/a>, it was reported that 31% of companies do not provide cybersecurity training to their employees. Moreover, among those employees who had joined the training, only 39% passed the basic cybersecurity quiz.<\/p>\r\n\r\n\r\n\r\n<p>How to stay educated:<\/p>\r\n\r\n\r\n\r\n<p>Companies should regularly provide insightful cybersecurity training sessions for their employees. Employees should also routinely attend and pay attention to those sessions, as this is beneficial not just for the company but also for general knowledge.<\/p>\r\n\r\n\r\n\r\n<p>In the session, aside from explaining how to avoid phishing messages or links, companies can also explain further how to access the company\u2019s network securely when the employees are working remotely, as well as the do\u2019s and don\u2019ts while working remote to increase the employee\u2019s awareness of the cybersecurity challenges they might face while working remotely.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"htoc-how-wowrack-can-help-you\"><strong>How Wowrack Can Help You<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Need assistance in making sure that your remote workers are accessing your corporate networks safely? We are here to help you in assessing and increasing your company\u2019s security posture. <strong>Contact us<\/strong> now for a free consultation with our team. Our team of experts is ready to help you 24\/7.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Working from home or remote working has become a trend that continues to flourish even as the pandemic winds down, as workers prefer to work from home. Aside from increased benefits, working remote also brings risks that employees must face when working in an unsecured cyber environment. The growing number of companies opening opportunities for [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":12337,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[82],"tags":[1078,1173,1163,1083],"class_list":["post-1816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-remote-working","tag-security","tag-wowrack","post-wrapper"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/posts\/1816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/comments?post=1816"}],"version-history":[{"count":0,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/posts\/1816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/media\/12337"}],"wp:attachment":[{"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/media?parent=1816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/categories?post=1816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wowrack.com\/en-us\/wp-json\/wp\/v2\/tags?post=1816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}