The Freeman

Top 5 WFH Cyber Risks and how to mitigate them

-

The world is changing. The way we work, the way our businesses operate and how they interact with one-another, are all evolving at a rapid pace. As technology continues to advance, cyber threats are becoming increasing­ly prevalent and can impact our organizati­on’s ability to function effectivel­y.

With the digital economy, cybersecur­ity has become an integral part of every aspect of modern life – especially at the workplace. From mobile devices and cloud-based applicatio­ns to social media platforms and online shopping portals, it seems like most things that people use on a daily basis may be vulnerable to attacks. Moreover, if hackers gain access to these systems, they may steal sensitive data or even shut down the critical services of a business completely.

Here are five work-from-home (WFH) cyber risks that organizati­ons face today:

• Phishing scams

• Weak passwords

• Unencrypte­d file sharing

• Unsecured home WIFI

• Working of personal devices.

Phishing scams: With the increase in companies implementi­ng WFH measures for employees, global phishing scams have become more prevalent.

Best practices:

• Check sender address in digital correspond­ences

• Contact sender to verify if unsure

• Check the clues, such as grammar errors

• Create awareness of phishing and scams through training / newsletter­s.

Weak passwords: In many cases, hackers gain access to corporate networks through weak combinatio­ns of usernames and passwords that are easy to guess and exploit Best practices:

• Use a strong, difficult-to-guess password

• Use a password manager

• Do not share/expose passwords

• Always use multi-factor authentica­tion where possible.

Unencrypte­d file sharing: Data security nightmares can occur if files are shared without encryption.

Best practices:

• Password-protect files and folders before sharing

• Use separate modes of communicat­ion to send the encrypted file/folder and password

• Use existing secure mail functions available in email systems (Gmail/Outlook).

Unsecured home WI-FI: There may be a risk as home WI-FI may have security gaps that hackers can exploit. Best practices:

• Check WI-FI encryption settings

• Use a strong, difficult-to-guess password

• Share WI-FI access using QR-codes

• Disable the WI-FI Protected Setup (WPS) feature

• Update your router’s firmware.

Working on personal devices: Employees may choose to use their own personal devices for work purposes, and the organizati­on should factor that in as a risk.

Best practices:

• Ensure that personal devices are password-protected

• Ensure that the storage of these devices are encrypted

• Create a non-admin profile for shared use by family members.

How can an organizati­on’s Data Protection Officer (DPO) help mitigate these risks?

The organizati­on must ensure that there is a plan to address these WFH Cyber risks head-on. It is vital to implement new policies and procedures, train staff members in best practices and create a plan to monitor employee behavior. The organizati­on can consider focusing on the following three key areas:

Employee training:

• Empower employees with the knowledge to identify phishing emails

• Teach the dos and don’ts of WFH

WFH policy:

• Develop, implement and communicat­e the WFH policy

• Create a Ca;; Tree to facilitate notificati­on during incident handling

• Ensure staff perform regular software updates Infosecuri­ty policy:

• Ensure that there is an escalation process (regulators, DPO and management) that is communicat­ed to employees

• Set up a standard operating procedure (SOP) for the loss of a personal device that has been used for work purposes.

In conclusion: as a result of repeated breaches in the new normal of dispersed WHF workforces, cybersecur­ity and data protection are now in the spotlight. In order to mitigate cyber risks, it is imperative that data protection offices work closely with IT department­s to monitor, operationa­lize and communicat­e new and best practices to all employees. We are in stand-by to assist you through training and through the provision of security software for DPOs and other security officers. Contact me at hjschumach­er59@ gmail.com

 ?? ??

Newspapers in English

Newspapers from Philippines