Now Reading
Wittwer: 4 tips for protecting your remote work environment against cybersecurity threats
[vc_row thb_full_width=”true” thb_row_padding=”true” thb_column_padding=”true” css=”.vc_custom_1608290870297{background-color: #ffffff !important;}”][vc_column][vc_row_inner][vc_column_inner][vc_empty_space height=”20px”][thb_postcarousel style=”style3″ navigation=”true” infinite=”” source=”size:6|post_type:post”][vc_empty_space height=”20px”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]

Wittwer: 4 tips for protecting your remote work environment against cybersecurity threats

John Wittwer

By John Wittwer | Guest Commentary

COVID has made a number of changes in both our personal and professional work environments.

Employees began to work remotely, most notably. While companies had to adjust to a new way to conduct business, many companies discovered that their employees are just as productive working remotely.

Many employees also reported lower overhead and decreased expenses. Employee satisfaction was also higher. While telecommuting has many benefits, remote work environments have made organizations more vulnerable to cybersecurity threats.

There are more than 4.3 millions Americans working remotely. Here are four tips to increase the security of your remote work setup.

Set Up Multi-Factor Authentication (MFA).

Multi-factor authentication eliminates the danger of passwords being stolen. MFA is a process that ensures that hackers can’t access your data if a password is compromised.

In a typical configuration, you log in with your username, password, and the password is validated via an authentication server. If the password was correctly entered, the authentication server will validate it. An example is sending a push notification from the authentication server to your second-factor device, such as your phone.

To confirm that the notification is genuine, you will need to approve it on your phone. MFA can also use biometrics such as fingerprints, faces, or eye scans to verify your identity.

This two-step procedure greatly reduces the risk of password breaches and unauthorized access to proprietary data.

Use a Virtual Private Network (VPN).

VPN software protects your data by hiding your IP address, encryption your data, and routing it through secure networks. This anonymizes your online identity and allows you to browse the Internet more securely.

Your internet service provider can access all of your internet data while you are connected to your home Wi Fi. Data breaches are common in companies, which could expose your information. A VPN will also prevent websites and apps from attributing your online activities directly to your IP address. It can also limit the collection or browsing history.

Make sure you have strong passwords.

It is becoming increasingly important to ensure that your passwords are secure, especially with the rise of remote workers and the ease and amount of information being exchanged online. These are the general rules for password security:

  • Use at least eight letters, numbers, or symbols in combination
  • Use words and names not found in the dictionary.
  • Don’t share any information about you or your family. You can tell us about your location, your interests, birthday, and so on.
  • Passwords must not be re-used
  • Use sequential numbers and letters sparingly
  • Change your passwords regularly
  • Passphrases can be used to describe a longer string or text that forms a sentence or phrase.

Keep your software current.

It is essential to have the most current software installed on your computer.

Software updates often include security patch, which can reduce the risk of malware infection. Software updates can fix security flaws and fix bugs that may be discovered. Software vulnerabilities are known as weaknesses in software programs and operating systems. Hackers love them.

They can exploit the weakness and write code to target it.

The code is then embedded into malware that can steal data from your device or allow attackers control of your computer to encrypt your files.

Establishing a secure remote workspace requires time, constant attention, and collaboration from your team of experts. These tips will help both employees and employers get started in protecting their remote workers from cyberthreats.

Editor’s Note: John Wittwer, a senior member of The Cavanagh Law Firm, focuses on cybersecurity and privacy as well as insurance coverage and commercial litigation. Wittwer is Paradise Valley native.

View Comments (0)

Leave a Reply

Your email address will not be published.