//////////////////////////////////////////
rity capabilities.
ll corporately
ices are equipped
apabilities,
work security best
in the enterprise
nts. These critical
connect users to
cloud and ons,
such as video
lications increasingly
ork environments.
n all laptops and
ing VPN tools
multi-factor
).
ploits, malware and
ol (C2) traffic using
threat intelligence.
licious domain URLs
kholing to thwart
tacks.
respond
empowered
rovided to
nd take
rd hygiene.
mplex passwords
cation where possible
ords frequently.
oftware. Individuals
d patches in a
on mobile devices
and any other non-corporate devices they
might use for work.
Secure your Wi-Fi access point. People
should change their default settings and
passwords in order to reduce the potential
impact on their work of an attack via other
connected devices.
Use a virtual private network (VPN).
VPNs can help create a trusted connection
between employees and their organisations
and ensure ongoing access to corporate
tools. Corporate VPNs provide additional
protection against phishing and malware
attacks, the same way corporate firewalls do
in the office.
Be wary of COVID-19 scams. We’ve seen
phishing emails, malicious domains and fake
apps out in the wild already. Threat actors
love to exploit real world tragedies and
COVID-19 is no different.
Don’t mix personal and work. Employees
should use their work devices to do work and
their personal devices for personal matters.
If you wouldn’t install or use a service while
you’re at the office, don’t do it while at
home on your work device.
Taking these relatively straightforward
steps at both an enterprise and individual
level should help address some of the most
common security risks facing our homeworking
environments. We should also
recognise that our threat environment is
not static, which means it’s important to
keep a close eye on evolving threats to avoid
unnecessary additional costs and disruptions
in a time when we can least afford them. •
www.intelligentcio.com