October 28, 2020

Covid-19: Decalogue to ensure cybersecurity outside the office | Fortune

In recent weeks there has been an increase in computer attacks as a result of the spread of teleworking. This is an especially delicate time to be a victim of one of these attacks, as protection is less outside the office. “At the user level, at home, we pay less attention, while at the office, we trust the company,” says the head of IT at Spring Professional, Elena Cobo-Reyes. From the consultancy they have prepared a decalogue with recommendations to mitigate the risks as much as possible.

  1. Company teams. The consultant urges to always use the work devices (mobile and computer) that the company has provided, and not to take advantage of being at home to take personnel for comfort, as they do not have the same protection measures. In the event that the company has not supplied this equipment and it is necessary to use the personnel, Cobo-Reyes recommends always using it and asking the technology department about the best way to proceed.
  2. Antivirus. Typically, all devices have antivirus and the latest update of all applications for greater security. If not, the expert recommends being proactive and asking for recommendations. “No one should make the decision of which programs to download individually according to the first result of Google, but it is convenient to ask the company so that everyone has the same standards,” he says.
  3. Secure pages. It is recommended to access only web pages that use the https protocol, as this final guarantee that it is a trusted site with three layers of security. “Especially with the mobile, we connect to anything. No worker unloads malware by the way, but it happens ”, justifies Cobo-Reyes.
  4. Wifi. Avoid public or open networks to connect with work teams, as they are usually more vulnerable. “You have to be very careful because there are free wifis anywhere and the corporate mobile phone can connect alone. It is recommended to turn off this network when you leave home, “says the directive.
  5. Change Password. Beyond the care that must be taken when connecting to public Wi-Fi networks, it is advisable to regularly change the password of the router itself, since there are countless platforms that can easily detect the password that came in the device by default.
  6. Use VPN. This type of connection allows secure access to the environment and work servers. “It is like a remote tunnel to be able to access encrypted information from anywhere”, develops Cobo-Reyes. In addition, the tool categorizes different workers to allow access to one or the other corporate areas, according to the functions of each one.
  7. Backups. It is the best way to prevent information from being lost, either by accident or by data hijacking, for which you can request a financial payment as a ransom in the future. Also, the consultant recommends being prepared for any circumstance, therefore, “having a copy in the cloud guarantees that colleagues can access it if they fall ill.”
  8. Automatic lock. Despite the fact that the home is perceived as a trustworthy environment, as is the office, from Spring Professional they recommend locking the equipment with a password as long as you are not in front of it. “They are sensitive data to which third parties should not have access,” says the person in charge.
  9. Ishing Phishing ’. In these types of attacks, hackers they pose as reliable sources, such as banks or companies, to obtain personal information or confidential credentials from the victim. Against this, Cobo-Reyes recommends extreme caution and not open suspicious emails. “They take advantage of the moment when the rest are weakest to attack. They use excuses that, due to the context, fit us. Now, for example, talk about a possible ERTE in the company, “he continues.
  10. Lean on the cloud. The expert insists that whenever possible, it is preferable to use the corporate cloud to store information rather than personal USBs. “If there is no other remedy, limit that device exclusively to professional use,” he says.


Source link