• Home
  • Services
    • Cyber Security Audit
    • Penetration Testing
    • Incident Response
    • Managed Services
    • Governance & Training
  • Products
  • Blog
  • About
  • Contact
Menu
  • Home
  • Services
    • Cyber Security Audit
    • Penetration Testing
    • Incident Response
    • Managed Services
    • Governance & Training
  • Products
  • Blog
  • About
  • Contact

Top Cyber Security Recommendations When Working From Home

Below are 7 top cyber security recommendations when working from home during The COVID-19 pandemic. Both Vertex Security and the ACSC (Australian Cyber Security Centre) offer these recommendations because working from home has specific cyber security risks.

Unfortunately, targeted cybercrime is on the rise and access to your information can have a devastating effect on both your finances and your work life.

Beware of Scams

Cybercriminals may try to turn a crisis into an opportunity. They may try to use the COVID-19 pandemic disruption to scam you and gain access to your systems. While working from home we recommend being extra cautious when opening messages, attachments, or clicking on links from unknown senders. As well as be wary of any personal details, passwords or bank detail requests.

Always Use Strong and Unique Passwords

 

Strong passwords are more important than ever right now. Be sure to use a strong and unique passphrase on all your devices including as laptops, mobile phones and tablets.

Use a different passphrase for each website and app, particularly those that store your credit card details or personal information. To use the same username (such as an email address) and passphrase for multiple accounts means that if one is compromised, they are all at risk.

Implement Multi-factor Authentication

Multi-factor authentication is one of the most effective ways to prevent unauthorised access to computers, applications and online services. It makes it much harder to access your systems. Cybercriminals might manage to steal one type of proof of identity but it is very difficult to steal the correct combination of several proofs for any given account.

You can view the ACSC Step-by-Step Guides – Turning on Two-Factor Authentication

Update Your Software And Operating Systems

Software updates are often developed to address security issues. So, it’s important to allow automatic updates on your devices. Updates also often include new security features that protect your data and device.

Training Your Employees To Be Cyber Safe

Working from home has different cyber security risks and threats that need to be understood and managed differently. 

We can perform our audit’s remotely with Zoom or Google Meet. Through some simple questions and our technology we can gather all the information to perform our assessment and provide an Audit report. Our Audit report includes an explanation of each Cyber Risk and the actions you and your employees need to take to reduce the risk.

Find out more about our Work From Home Cyber Security Audit.

Use Trusted Wi-Fi

Often free wireless internet networks can put your information at risk and can expose your browsing activity to cybercriminals. Cybercriminals have also been known to set up rogue Wi-Fi hotspots with names that look legitimate and can intercept communications, steal your banking credentials, account passwords, and other valuable information.

Use trusted connections when working from home, such as your home internet or mobile internet service, or VPN provided by your work.

Avoid Using Portable Storage Devices

If possible, transfer files in more secure ways than USB drives, such as your organisation’s cloud storage or collaboration solutions. When using USBs and external drives, make sure they are protected with encryption and passphrases.

 

Categories

Security

Tags

Business cybersecurity - cyber - cyber attack - cyber insurance - cyber risk - cyber security - cyber security audit - cyber security monitoring - cyber security training - cyber security vulnerability - work from home - work from home audit
PrevPreviousPassword Fingerprint Cloning
NextShould I use COVIDSafe the Australian contract tracing app?Next
Share on facebook
Share on twitter
Share on linkedin
Share on email
Search

Recent Posts

Every 10 Minutes an Australian Small Business is Attacked

5 Cyber Security Lessons From 2020 Your Businesses Should Implement in 2021

What to do if your business is hacked

US GOVERNMENT HACKED

Is Your Business a Target?

Archives

Archives
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • February 2019
  • January 2019
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • November 2016
  • October 2016
  • May 2016

Categories

  • API
  • Attack
  • Awards
  • Defence
  • Events
  • Other
  • Press
  • Security
  • Uncategorised
Menu
  • API
  • Attack
  • Awards
  • Defence
  • Events
  • Other
  • Press
  • Security
  • Uncategorised
  • APRA
  • Audit
  • Data Breach
  • Email
  • Governance
  • Penetration Testing
  • Process
  • Training
Menu
  • APRA
  • Audit
  • Data Breach
  • Email
  • Governance
  • Penetration Testing
  • Process
  • Training

Your partner in Cyber Security.

Facebook
Twitter
Linkedin
  • About
  • Products
  • Cyber Security Audit
  • Penetration Testing
  • Incident Response
  • Managed Services
  • Governance & Training
  • Contact
Menu
  • About
  • Products
  • Cyber Security Audit
  • Penetration Testing
  • Incident Response
  • Managed Services
  • Governance & Training
  • Contact
  • Contact
  • 1300 2 CYBER (29237)

Level 4, 11 York Street Sydney NSW 2000