SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Working from home- How secure is it?
The current health crisis the world is witnessing today is truly unexpected and
unfortunate. We have never experienced a crisis like this before that forced us
to confine within the four walls of our house. When you know something like
this is going to happen, you can plan things accordingly, be it related to your
personal life or professional. But COVID-19 pandemic didn’t give us time to
prepare. Before we could realize what was happening, the entire world
entered into a lockdown.
Security
Most of the employees have started to work from home and this might pose
certain challenges, specifically on the security front. There are chances of
risks and the security team of an organization must identify the common risks
that might arise when employees are working remotely. The security team
should coordinate with the communication team and the latter must train the
employees on the risks and how to manage them. This will simplify the
process of security and motivate employees.
Even after training employees on these, they might encounter problems with
regard to security and will be in need of help. It is always advisable to answer
their queries in real-time using technology or forum, such as e-mail, Skype,
teams or any such platform. This will make security as approachable as
possible and will enable the security team to quickly identify and respond to
incidents.
Social engineering
The platform you are using to answer queries should have strong
authentication mechanisms; otherwise cyber attackers will see this as an
opportunity to socially engineer these platforms.
Social engineering attacks are one of the greatest risks that will arise when
employees work from home. The user will be prompted to make a mistake,
without their knowledge and during a time like this, when you get numerous
calls and emails related to the pandemic, it will be much easier to trick the
user. Chances of overlooking these scams are high. The solution is to train
employees on what social engineering is, how to identify it and what to do
once you identify one. Even though phishing is the most common form of
cyber attack, there are other modes as well and employees should be aware
of these.
Strong Passwords
Weak passwords have always been one of the top reasons for security
breaches and it makes the job of hacker pretty much easier. Below listed are
four key behaviors to manage this risk;
 Passphrases: Compared to passwords these are comparatively longer and
ensures added security.
 Unique passwords for all accounts: Do not give the same password to all the
accounts; they should be unique and strong.
 Password managers: This helps in storing and managing online credentials.
 MFA (Multi-Factor Authentication): User is given access only after successfully
entering two or more independent credentials.
Updated systems
The security team must see to it that the employees are using the latest
version of the operating system, applications and mobile apps. Everything
should be updated, as updation helps in patching security holes.
Tips
Here are some tips for you that can be useful while working from home;
 Here are some tips for you that can be useful while working from home;
 Change the default admin password, enable WPA2 encryption and use a strong
password for your wireless network
 All the devices connected to home network must be protected by a strong
password and should be updated. Systems should be locked while you are not
using it
 Both the operating system and applications must be patched and updated
 Do not discuss any confidential details with clients in public
 Keep your system in a secure place and also ensure to keep your screen private.
Position it away from other people
 Do not access any internet sites other than the access required
 Inform IT department if you come across any abnormal activity through emails or
systems
 If you are sharing any confidential information via emails, protect it with a
password. Share the password with the user in person and not through email.
 Do not use official laptop for personal use (internet or unauthorized applications
or software) and avoid carrying laptop to public places to work.
Above all, one should have the common sense to differentiate between
genuine things and scams. It is easy to fall prey to scams, but difficult to get
out of one.
Get Free Consultation
Working from home- How secure is it?
HLB HAMT
Level 18, City Tower-2,
Sheikh Zayed Road
PO Box 32665
Dubai – United Arab Emirates. Tel: +971 4 327 7775
E-mail: dubai@hlbhamt.com
www.hlbhamt.com

Más contenido relacionado

Similar a Working from home- How secure is it.pdf

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfYuriKasan
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 

Similar a Working from home- How secure is it.pdf (20)

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Secure End User
Secure End UserSecure End User
Secure End User
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdf
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 

Más de Fiyona Nourin

Recent updates in UAE.pdf
Recent updates in UAE.pdfRecent updates in UAE.pdf
Recent updates in UAE.pdfFiyona Nourin
 
Excise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfExcise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfFiyona Nourin
 
Regulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfRegulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfFiyona Nourin
 
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfUAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfFiyona Nourin
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfFiyona Nourin
 
The Digital Future of HR.pdf
The Digital Future of HR.pdfThe Digital Future of HR.pdf
The Digital Future of HR.pdfFiyona Nourin
 
Blockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfBlockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfFiyona Nourin
 
Dubai Future District.pdf
Dubai Future District.pdfDubai Future District.pdf
Dubai Future District.pdfFiyona Nourin
 
New Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfNew Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfFiyona Nourin
 
2020 Towards the next 50.pdf
2020 Towards the next 50.pdf2020 Towards the next 50.pdf
2020 Towards the next 50.pdfFiyona Nourin
 
VAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfVAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfFiyona Nourin
 
The Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfThe Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfFiyona Nourin
 
DIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfDIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfFiyona Nourin
 
Timeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfTimeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfFiyona Nourin
 
VAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfVAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfFiyona Nourin
 
Transfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfTransfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfFiyona Nourin
 
Robotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfRobotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfFiyona Nourin
 
A Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfA Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfFiyona Nourin
 
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfAccountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfFiyona Nourin
 
Emerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdfEmerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdfFiyona Nourin
 

Más de Fiyona Nourin (20)

Recent updates in UAE.pdf
Recent updates in UAE.pdfRecent updates in UAE.pdf
Recent updates in UAE.pdf
 
Excise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfExcise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdf
 
Regulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfRegulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdf
 
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfUAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
 
The Digital Future of HR.pdf
The Digital Future of HR.pdfThe Digital Future of HR.pdf
The Digital Future of HR.pdf
 
Blockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfBlockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdf
 
Dubai Future District.pdf
Dubai Future District.pdfDubai Future District.pdf
Dubai Future District.pdf
 
New Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfNew Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdf
 
2020 Towards the next 50.pdf
2020 Towards the next 50.pdf2020 Towards the next 50.pdf
2020 Towards the next 50.pdf
 
VAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfVAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdf
 
The Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfThe Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdf
 
DIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfDIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdf
 
Timeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfTimeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdf
 
VAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfVAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdf
 
Transfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfTransfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdf
 
Robotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfRobotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdf
 
A Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfA Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdf
 
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfAccountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdf
 
Emerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdfEmerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdf
 

Último

CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 

Último (20)

CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

Working from home- How secure is it.pdf

  • 1. Working from home- How secure is it? The current health crisis the world is witnessing today is truly unexpected and unfortunate. We have never experienced a crisis like this before that forced us to confine within the four walls of our house. When you know something like this is going to happen, you can plan things accordingly, be it related to your personal life or professional. But COVID-19 pandemic didn’t give us time to prepare. Before we could realize what was happening, the entire world entered into a lockdown. Security Most of the employees have started to work from home and this might pose certain challenges, specifically on the security front. There are chances of risks and the security team of an organization must identify the common risks that might arise when employees are working remotely. The security team should coordinate with the communication team and the latter must train the employees on the risks and how to manage them. This will simplify the process of security and motivate employees. Even after training employees on these, they might encounter problems with regard to security and will be in need of help. It is always advisable to answer their queries in real-time using technology or forum, such as e-mail, Skype, teams or any such platform. This will make security as approachable as possible and will enable the security team to quickly identify and respond to incidents. Social engineering The platform you are using to answer queries should have strong authentication mechanisms; otherwise cyber attackers will see this as an opportunity to socially engineer these platforms.
  • 2. Social engineering attacks are one of the greatest risks that will arise when employees work from home. The user will be prompted to make a mistake, without their knowledge and during a time like this, when you get numerous calls and emails related to the pandemic, it will be much easier to trick the user. Chances of overlooking these scams are high. The solution is to train employees on what social engineering is, how to identify it and what to do once you identify one. Even though phishing is the most common form of cyber attack, there are other modes as well and employees should be aware of these. Strong Passwords Weak passwords have always been one of the top reasons for security breaches and it makes the job of hacker pretty much easier. Below listed are four key behaviors to manage this risk;  Passphrases: Compared to passwords these are comparatively longer and ensures added security.  Unique passwords for all accounts: Do not give the same password to all the accounts; they should be unique and strong.  Password managers: This helps in storing and managing online credentials.  MFA (Multi-Factor Authentication): User is given access only after successfully entering two or more independent credentials. Updated systems The security team must see to it that the employees are using the latest version of the operating system, applications and mobile apps. Everything should be updated, as updation helps in patching security holes. Tips Here are some tips for you that can be useful while working from home;  Here are some tips for you that can be useful while working from home;
  • 3.  Change the default admin password, enable WPA2 encryption and use a strong password for your wireless network  All the devices connected to home network must be protected by a strong password and should be updated. Systems should be locked while you are not using it  Both the operating system and applications must be patched and updated  Do not discuss any confidential details with clients in public  Keep your system in a secure place and also ensure to keep your screen private. Position it away from other people  Do not access any internet sites other than the access required  Inform IT department if you come across any abnormal activity through emails or systems  If you are sharing any confidential information via emails, protect it with a password. Share the password with the user in person and not through email.  Do not use official laptop for personal use (internet or unauthorized applications or software) and avoid carrying laptop to public places to work. Above all, one should have the common sense to differentiate between genuine things and scams. It is easy to fall prey to scams, but difficult to get out of one. Get Free Consultation Working from home- How secure is it? HLB HAMT Level 18, City Tower-2, Sheikh Zayed Road PO Box 32665 Dubai – United Arab Emirates. Tel: +971 4 327 7775 E-mail: dubai@hlbhamt.com www.hlbhamt.com