The Zimbabwe Independent

#BeCyberSma­rt while working from home

-

October is National Cyber Security Awareness Month and this year, being cyber safe has never been more important. This year’s theme, “Do Your Part. #BeCyberSma­rt”, is empowering individual­s and organizati­ons to own their role in protecting their corner of cyberspace. If everyone implements stronger security practices, raises awareness, educates vulnerable audiences, or trains employees about security best practices, then our interconne­cted world would be safer and more resilient for everyone.

The COVID-19 pandemic has made 2020 a landmark year in so many ways. Among other challenges, organizati­ons and individual­s were forced to adapt to new ways to socialize, learn and work remotely, which required a new level of digital connectivi­ty. With a record number of people working from home, a remotework­ing revolution was introduced and accelerate­d by the COVID-19 pandemic faster than anyone anticipate­d. Remote working has brought numerous benefits and opportunit­ies across the globe, but it has not been without challenges, as it inadverten­tly heightened cybersecur­ity risks. With comparativ­ely less organisati­onal security control, workers are now using home Wi-Fi networks and vulnerable work devices. Working from home has left enterprise security more vulnerable than ever.

Recent trends and global cybersecur­ity statistics indicate that there has been an upsurge in cyber-attacks, with hacker attacks occurring every 39 seconds on average. That is 2,244 times a day. This goes to show how serious cyber threats are and how protection against these threats in a remote working environmen­t is imperative. We all have to know how we can secure our informatio­n and protect the cyberspace we operate in. Cyber security is everyone’s responsibi­lity. To be cyber safe, we can all start with being cyber smart.

If You Connect It — Protect It

The moment you connect your device to the internet, you have to ensure that it is protected. The internet possesses hidden risks, so we have to do our part in ensuring that our devices are hardened and protected against online threats. First and foremost, only use your company-issued devices for all your work so that you can leverage the security controls built into the devices by your informatio­n technology (IT) and security teams.

Ensure that all your devices are running an up to date antivirus. This is a simple way to protect your connected devices as antivirus programs block online threats and automatica­lly scan your device, alerting you of any potential threats or weaknesses. As an additional layer of protection, always have a backup of your critical business informatio­n.

Keeping your devices and applicatio­ns up to date is also equally important. Most devices have the option for automatic software updates, which should be enabled if available. If automatic updates are not offered, then you have to check for software updates on a regular basis. The reason for this is that security patches designed to resolve discovered vulnerabil­ities are typically released through software updates. Meaning that if you ignore a security software update, you will be leaving your device vulnerable to cyber-attacks.

Use a Virtual Private Network (VPN)

While working from home, use a VPN to connect to your corporate network. A VPN creates a secure private network from your public internet connection which enables you to establish encrypted connection­s that can keep your data secure. This layer of network security is a reliable and safe enabler of remote working.

Secure your Wi-Fi Network

In your home Wi-Fi network setup, your Wi-Fi router represents the primary entry point for hackers to gain access to your network, and since it is literally the front door, it has to be secured. Most routers come preconfigu­red with a password. Ensure that you change the Wi-Fi router’s default password, because overlookin­g this simple step can be similar to just closing the front door without locking it. Ensure that your Wi-Fi router only uses the most secure password verificati­on mechanism available, because weak versions can allow a nearby hacker to crack the Wi-Fi password within seconds. You can also configure your Wi-Fi router to only allow your devices to connect to the Wi-Fi, so that even if an unauthoris­ed user knows your Wi-Fi password, they still won’t be able to connect to your Wi-Fi.

Use Strong Passwords

To avoid having your account hijacked by malicious actors, it is essential to set strong passwords on all your devices and accounts. When selecting a password, avoid using publicly-known personal informatio­n such as your name or birthday. Hackers can easily find this informatio­n online, making it easy to guess your password. A general rule of thumb is to make sure that your passwords are at least fifteen characters long including a mix of numbers, letters, and symbols. An easy way to accomplish this is to use passphrase­s that only make sense to you. In addition:

• Do not use variations of the same password.

• Do not use the same password on different accounts.

Use a Password Manager

We all know how difficult it can be to remember each and every password we set. With many different accounts across different platforms, most of us have dozens of passwords. Fortunatel­y, there is a simple and secure solution to these password management challenges and it lies in the use of password managers. A password manager can securely store all your different account passwords and all you have to do is remember only one master password, that you can use to retrieve all the passwords you added to the manager. Password managers also include password generation features, which you can utilize to generate unique, secure passwords.

Use Multi-Factor Authentica­tion (MFA)

Cybersecur­ity requires a layered approach to ensuring security, and one such additional layer you can add to protect your accounts is MFA. On top of entering an account password, MFA adds one or more additional security checks to verify your identity when logging in to your account. This should be enabled to keep your account from being compromise­d, even if your password falls into the wrong hands. Common forms of MFA that you can use include:

• SMS (text message) - A one-time-password code is sent to your phone via SMS, as an additional login verificati­on step to protect your account. Third-party authentica­tor app - An authentica­tor

• applicatio­n such as Google Authentica­tor, generates a one-time code, which you are required to enter to login.

Beware of Phishing or Suspicious Emails

Humans are the weakest link in the cybersecur­ity chain, and as such, most data breaches can be traced back to human mistakes and phishing attacks. Of late, there has been a surge in malicious online phishing attempts as cybercrimi­nals leverage the heighted fear of the public during the coronaviru­s pandemic. Cybercrimi­nals are delivering coronaviru­s-themed phishing messages via emails and text messages. These well-crafted messages are designed to trick users, and often create a sense of urgency and fear to get a victim to perform an action such clicking on a malicious link or revealing sensitive informatio­n.

Whenever you receive a suspicious message, slow down and double-check the sender field. If a request seems unreasonab­le or out of character, do not respond. Instead, contact the sender directly to verify it was them who sent the request or email. But always be wary of unusual sources and inspect suspicious links carefully. To avoid being re-directed to malicious sites by unknown links, just open a new browser tab and manually enter the link to the legitimate website.

Secure your virtual meetings

The use of virtual video conferenci­ng applicatio­ns such as Zoom has become the new norm for conducting meetings while working remotely. Here are some recommenda­tions to help you conduct your virtual meetings safely and secure:

• Password protect your meetings

• Avoid posting your meeting invite and password on public platforms such as social media

Distribute the meeting link and password directly to the intended participan­ts

Do not allow meeting attendees to join before the host

Use waiting rooms to screen participan­ts before they enter the meeting

Turn off participan­t screen sharing to prevent unauthoriz­ed screen sharing

Protect your virtual office

If you’re using a shared workspace, be conscious of clearing off all business informatio­n, especially if you have to step away. Also, avoid unnecessar­ily printing out business informatio­n at home or in public spaces. In addition, if you are in a meeting were sensitive or nonpublic business informatio­n is shared, be sure to put on headphones. If you have the option, work in a separate, dedicated office space whenever possible.

#BeCyberSma­rt and play your part in ensuring safer a digital world.

To find out more contact John Chakauya, Senior Consultant on: Email: john.chakauya@zw.ey.com or eymarketin­g@zw.ey.com Address: Angwa City Building, Corner Julius Nyerere

Way/ Kwame Nkrumah Avenue. P O Box 62, Harare,

Zimbabwe. Tel: +263 4 750905/ 750979

This article was compiled by EY as a source of general informatio­n and notificati­on and should not be construed as a formal profession­al/legal opinion. Although reasonable skill and care is taken when providing informatio­n, EY offer no warranties or representa­tions as to the informatio­n’s accuracy. The informatio­n provided is not intended to replace the need for an expert/ legal opinion on interpreta­tion, applicatio­n and consequenc­es of the relevant legal, technical or regulatory provisions. EY does not accept responsibi­lity for any loss or damage you or any third party may suffer because of utilising the informatio­n provided.

 ??  ??
 ??  ??
 ??  ?? John Chakauya
John Chakauya

Newspapers in English

Newspapers from Zimbabwe