WORKING FROM HOME – CYBER RISKS
WORKING FROM HOME – CYBER RISKS
In response to lockdown restrictions, many companies, essential and non-essential, have requested their staff to work from home as a way of adapting to the new normal and at the same time protecting their employees from Covid-19 exposure. Though this option may seem to be viable in ensuring business continuity, there are however pros and cons for many businesses. Due to the prevalent use of ICT, one major risk that comes to the fore is cyber risks as many organisations lack the experience, protocols and technologies to enable a remote workforce to work in a secure way.
Cyber criminals are on the prawl attempting to access corporate data, customer information and intellectual property. At the same time employees can be a weak link in corporate IT security systems as the issue of Confidentiality is also another risk of working from home. For instance, “How do you ensure third parties are not overhearing confidential conversations relating to your firm? How do you preserve client confidentiality? These are significant and real issues and this comes back to whether the employer has mechanisms to ensure that people have an appropriate work environment.
There has been serious concern for organizations that have not extended secure internet hotspot devices for employees to connect to while working remotely. The security of personal Wi-Fi is highly questionable, especially when it is accessed by multiple users for personal use. Home networks commonly have the Wired Equivalent (WEP) protocols, which are known to be weaker, paving the way for cyber criminals to walk into your data and devices.
There is need for employees working from home to constantly check for signs of cyber breach to enable action to be taken quickly to avoid losses.
Below are 4 signs to detect cyber breach
- New programs that were not installed appear.
- The computer slows down.
- Strange pop-up ads appear on the screen.
- Loss of control of the mouse or keyboard.
Though no organisation can be immune to cyber attacks there are various ways available to mitigate risks of being attacked
Antivirus protection. One should have authentic antivirus with a license to antivirus and malware software for use on their personal computers. This may not provide failsafe protection, however it eliminates many low-level attacks.
Cybersecurity awareness. Staff need to be trained on best practices and procedures to regulate the sending of emails or other content to private email addresses and/or cloud storage.
Phishing awareness. Employees should be vigilant when receiving emails and should check the authenticity of the sender’s address.
Home network security. Employees should ensure that their home Wi-Fi is protected by a strong password.
Cyber Insurance Cover. This cover Protects businesses against computer-related crimes and losses. This can include targeted attacks, such as malware and phishing, as well as the occasional misplaced laptop containing confidential material.
If your business computer system is compromised by a targeted or an accidental attack, you may be liable for the cost to notify the affected parties and provide reassurances, even if the data is not exploited.