9 Cybersecurity Best Practices for COVID-19 Remote Workers | Vumetric
Cybersecurity Covid 19 Coronavirus Remote Work

9 Cybersecurity Best Practices for COVID-19 Remote Workers

Share on linkedin
Share on facebook
Share on twitter
Table of Content
    Add a header to begin generating the table of contents

    Amidst the coronavirus pandemic, many organizations have opted for remote work for the next following weeks to prevent the spread of the virus. This way, they can limit the impact on their business and keep their business active even as many of their employees are isolating. With remote work, comes various cybersecurity challenges for which companies are not prepared to deal with. Hackers will take advantage of the Coronavirus, as shown by recent attacks on healthcare agencies, so it’s important for organizations and employees to be prepared to prevent any potential incidents.

    Here are 9 cybersecurity best practices for remote workers who are self-isolating for COVID-19:

    1. Use a VPN (Virtual Private Network)

    A VPN (Virtual Private Network), while useful for online privacy, can also protect your traffic from being intercepted by hackers. This virtual internet tunnel encrypts all of your internet traffic to ensure that any data shared with your company’s network and technologies are safe from attackers. It is recommended to use a paid version of a VPN, as a high volume of users will be using free VPN’s for work, which will slow down internet speeds considerably and lower your productivity.

    2. Use Good Password Hygiene

    Good password management is often neglected when it comes to mitigating cybersecurity risks, but all it takes is one compromised password for a hacker to take over your accounts and gain access to critical systems for your organization. When a database is breached, such as the Linkedin data breach, attackers will incorporate leaked passwords and user names into their tools to perform advanced types of attacks, such as brute force attacks, attempting millions of password and username combinations in a matter of seconds. According to statistics, nearly 1/3 of adults re-use passwords for their accounts. Should their password be leaked on the dark web following a data breach, they will put their entire company at risk. Working remotely should not be an excuse to neglect password best practices, as employees will be surrounded by their relatives. It is inadvisable to leave password hanging around their computers with passwords that allows anyone to connect into critical company accounts.

    While working from home, employees should use password managers such as Lastpass, to generate strong passwords and to ensure that no password is being re-used. This will remove the need to remember each password used for work and will allow them to remain productive. Now is the best time to reset all passwords and to start practicing good password hygiene.

    3. Setup Two-factor Authentication

    Having a strong password often isn’t enough to mitigate cybersecurity risks, for example, if your credentials are not properly encrypted within your company’s systems or if an attacker is able to “guess” using advanced hacking tools. Two-factor authentication (2FA) provides an extra layer of protection to your accounts and validates the employee’s identity more efficiently. The extra step could be an email, a text message, a randomly generated PIN, which only the employee would be able to provide. While two-step authentication is not hacker-proof, it will add yet another protection to prevent an unauthorized intrusion into your company accounts and systems. Many distant connection alerts will be disregarded by your IT teams in these following weeks. Two-factor authentication will help limit the risks that an unauthorized connection is being ignored.

    4.  Use Strong Anti-virus Software

    Although Windows has decent built-in virus protection (Windows Defender), it is not sufficient to protect your computer. Remote workers should be vigilant and install strong anti-virus software, such as Bitdefender, and perform regular scans to identify and malware that could be lurking on their devices.

    5. Beware of Phishing Scams

    Hackers are taking advantage of the pandemic to send phishing emails in mass. They will often take advantage of the fear around the virus to create convincing scenarios that will coerce employees into submitting their authentication information or to download malware that will allow hackers to perform further malicious acts. Some recent phishing campaigns are attempting to replicate official government documents regarding the COVID-19 virus, allowing hackers to infiltrate malware onto the user’s computer. Some types of malware can be used to spy on the users, capture sensitive information and data.  Since a majority of communications are now performed through emails for COVID-19 remote workers, they are much more susceptible to fall for these attacks.

    To spot a phishing email, check the sender’s email address for spelling errors and look for poor grammar in the subject line and email body. Hover over links to see the URL and don’t click links or attachments unless you trust the sender 100 percent. If in any doubt, contact the alleged sender using a phone number or email address that you find somewhere other than in the suspicious email.

    6. Install Updates Regularly

    Updates can often be seen as an annoyance for many, causing downtimes and delays for remote workers. But they are crucial, as updates are often released to patch security vulnerabilities that have been uncovered since the last iteration of the software was released. For instance, Microsoft recently released a security update to patch a vulnerability that could allow hackers to gain full access to any systems that were not updated. It is even more important now that many employees are connecting to their company’s systems and accounts through their personal computers, as they could pose an important risk to the confidentiality of their company’s information.

    7. Keep Work Data on Work Computers

    If you work at an organization with an efficient IT team, they may be installing regular updates, running antivirus scans, blocking malicious sites, etc., and these activities may be transparent to you. There is a good chance you have not followed the same protocols with your personal computer as are mandatory at work. Furthermore, your company can likely afford higher-end technical controls that you can personally. Without those running in the background, your personal computer is generally less safe for work because it could be compromised by a third party. When possible, employees should limit the use of their personal devices for work and refrain from downloading any sensitive information to their computer, as those files could easily be compromised by a malicious file that has been roaming on your computer without your knowledge.

    8. Secure Your Personal Network

    In most cases, home routers are left with default passwords since their first installation. Default credentials for every type of devices are well known by modern cybercriminals and will be one of the first things they will attempt when hacking into your network. Changing your router’s password is an important step to protect your personal network to prevent malicious intrusions into any connected devices, such as the computer used for remote working. You should also make sure that your router’s firmware is up to date, for the same reasons mentioned previously. Hackers are well aware of vulnerabilities available within outdated versions of various technologies, which only acts as another part of their toolset they will use when attempting to attack personal networks. These vulnerabilities will be exploited much more frequently with many companies now opting for remote work to prevent the spread of COVID-19. Another easy step you can take to keep hackers at bay is to make sure that your network’s encryption is set to WPA 2 or 3, which is much harder to crack than traditional WEP encryption.

    9. Beware of remote desktop tools

    Many employers will allow their employees to connect remotely to their internal networks in the following weeks to keep working from home, considering that they have no other ways to access their systems. While there are many secure options for remote access, such as LogMeIn or Teamviewer, there is a multitude of malicious remote access software trying to benefit from the COVID-19 pandemic to infiltrate corporate networks. From internal networks, cybercriminals will attempt to infiltrate deeper layers of security to exfiltrate sensitive information or to infect the network with ransomware.

     

    Want to know how we can help?

    Recent Vumetric Blog Posts

    How to Improve Office 365 Security
    How to Improve Office 365 Security With 9 Tips

    Office 365 is a valuable productivity and collaboration tool. It offers businesses numerous benefits, including easy collaboration, remote …

    Isometric Personal Data Information App, Identity Private Concept. Digital data Secure Banner. Biometrics technology vector illustration for personal identity recognition and access authentication.
    Why Automated App Pentests Are Not Enough

    With the ever-growing amount of applications provided to customers, the prospect of performing Application Penetration Testing on each …

    Cybersecurity Statistics
    20 Cybersecurity Statistics You Should Know

    Cybersecurity has become increasingly important across every industry due to the massive transition to digital operations. Businesses can …

    Benefits of PCI Compliance
    5 Benefits of PCI-DSS Compliance

    Are you thinking of accepting credit or debit cards as a form of payment?  Have you started accepting …

    How to Improve a Website's Cybersecurity
    9 Tips to Improve Your Website’s Cybersecurity

    According to statistics from IBM, the loss of business following a cybersecurity incident averages at $1.42 million, perhaps …

    Assess Your Cybersecurity Risks

    A specialist will reach out in order to:

    • Understand your needs
    • Determine your project scope
    • Provide a cost approximation
    • Send you a detailed proposal
    • This field is for validation purposes and should be left unchanged.
    stay informed!
    Subscribe to stay on top of the latest trends, threats, news and statistics in the cybersecurity industry.
    • This field is for validation purposes and should be left unchanged.