SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
Cyber
Security
Basics
Work From Home
Cybersecurity Basics
for Employees and
Employers
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Dinesh O Bareja
CISA, CISM, ITIL, ISMS, Cert ERM, Cert IPR
• COO – Open Security Alliance
• Researcher – indiawatch.in
• Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd
-- Cyber Peace Foundation
• Co-Founder – Indian Honeynet Project
• Ex Cyber Surveillance Advisor – CDRC (Jharkhand Police – Special Branch)
Enterprise & Government Policy Development; Cyber
Security Strategy, Design, Architecture; Current State
Security Assessment, Audit & Optimization;
Governance, Risk Management
ABOUT ME
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
We Went From Here
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
To Here!
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Our Happy Meetings Were This
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
And Now
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
7 Months Later
• We (workers) are not so happy
with WFH because
• Long and uncontrolled work
hours
• Domestic issues
• Work environment may not be
friendly… etc
• We, (Employers) are happy
because
• Situation has shown WFH works
and employees work
• Business model is being re-
designed for BIG financial saving
• Productivity levels and unlimited
availability of workforce… etc
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
The Present Situation
• All employers were FORCED to send employees home and ask them
to work from home
• All Employees rejoiced ! Now they have finally got what they had
been asking for! For a long time !! (But… it was against company
policy or only for senior management)
• Working from home is being called the new normal … to make
everyone happy !
• From the information security standpoint – the threat surface has
increased, new risks have cropped up, the responsibility for secure
working is greater
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Crackers
(Malicious
Hackers), Cyber
criminals are
happy
• Plenty of targets
• Weak defenses
• Thousands of paths
• Multiple points at home
• Users not in controlled environment
• Social engineering will work taking
advantage of loneliness and
psychological weaknesses
• Easy spear phishing / whaling
• Exploit corona virus FUD factor,
fake news, information overload
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Cyber criminals are opportunistic
and will look to exploit fears, and
this has undoubtedly been the case
with the Coronavirus outbreak
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
A Target
Without
Boundaries
Stay Safe… Don’t Become One
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Target
Without
Boundaries
Stay Safe… Don’t Become One
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself – Your
Workspace &
Workplace
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Workspace (place)
• Hide the wall, shelves, utensils behind you with a backdrop
• Light up the desk and shut down from behind you. Poorly lit video
calls are not good
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – YOU & YOUR NEW NORMAL
• Obtain and keep a list of names, phone numbers, email
and WhatsApp, so you have the correct contact
coordinates for HoD, TL’s and team members from your
department, and the following:
• Stay alert for out-of-the ordinary events when browsing,
working on your computer, phone calls etc
• If you fall victim report it to your IT / IS support
immediately
• IT
• IS
• BC/DR
• HR
• Admin
• Finance
• HelpDesk
• Legal
• Police
• Fire
• Courier
• Taxi
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Workspace (place)
• Keep a workspace / place which is quiet and private
• If not possible, keep your self on mute always!
• Clear and clean desk … de-clutter
• Consider addition of a monitor and UPS to your home office
• Secure your wifi (whitelist all devices, set a strong pwd)
• For your official computer - set a password and lockout screen
• Get a good ergonomic chair – you are going to be sitting in a
chair much more than you ever sat in office!
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Workspace (place)
• Wear a decent shirt always before starting your work day
• Keep a glass of water nearby
• Educating family members about life in the new normal !
• Discuss and share the rules of working with all family
members
• Tell them what your employer expects and request their
help
• Keep children, adults, water and food away from your
workspace
• Do not have your meals at your workstation and do not eat
when on a call
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself – Your
Devices
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Device(s)
• Your ant-virus, system updates should happen automatically (if
configured so by your IT team) do not stop the process
• Do not install any software (crack, freeware, unlicensed), pirated
movies, or download pirated books, images
• Stay away from torrents, dark web, ecomm and free download sites
• So not click any links in emails (or website) – Stop, Read, Verify, Click
• Make sure your device is configured securely by the IT team and has
all the authorized applications
• Do not plug in any other devices or USB into your official device
• Keep access to yourself and do not use for any domestic work
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself –
Communication
Channels
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Communication Channels
• Get a good mic and headset … test it to see it works good with your
video conferencing application
• Try to get a noise cancelling headset (does not matter whether it is
children playing around, there are a bit too many noises in or
environment)
• Consider purchasing a webcam and a bright table lamp so that your
video quality is good
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Communication Channels
• Upgrade your broadband
connection
• Subscribe to a good data plan –
keep this as a backup to your
broadband connection
• Walk around your home to see
where you get the best
cellphone signal so you know
where you should be if you are
on a phone call
• Do not trust emails with links
claiming to have important
updates (bogus links may lead to
devices being infected)
• Do not share company
information with anyone who
calls you or connects on social
media
• Remember email, phone
numbers, voice can be spoofed
• When asked for such
information, hang up and call
back (use the phone numbers in
your Comm list)
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself –
Your Work
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Work
• Make sure your anti virus is working and updated
• Allow your system update to happen, do not postpone
• Save your work with passwords
• Save to your official cloud space
• If you are an independent person working from home, back up to
an external device periodically (weekly?)
• Change settings on your office applications to save your work in real
time or every 5 minutes (or less)
• Be extra vigilant – do not open attachments from unknown sources,
forward to IT/IS team
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself –
Mind Body & Soul
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
• Take a break from your chair
• Live by the clock (does 9 to 5
work? Make it work, draw the
line)
• Meditate, pray, paint, sing,
chores, play music, carrom,
scrabble.. whatever … keep
your life intact
• Exercise, walk, cycle, climb
stairs
• Meals with family
• Go slow on TV shows, movies
Secure Yourself – Your Body, Mind & Soul
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Employer
Support
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Employer Support Obligations
• Set work timings and dissuade
late evening meetings
• Provide video conferencing
account
• Communication protocol – ask
the person to call back (do not
feel offended if the person does
not share information and insists
on calling back)
• Personalized Communication
Directory with names etc
• WFH code of conduct and Policy
• Acceptable Use policy and
procedure for WFH assets, VPN
• BCP and DR procedure for WFH
• Advisories, Awareness training
• Employee inclusion programs
• Company announcements, and
new successes … etc
Provide Policies and Procedures that include
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Reality is Humorous
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
ABOUT ME
MY CONTACT
INFORMATION
Information Security professional
working hard to stay abreast of
technology, risks, threats,
opportunities and looks forward
to the excitement of the future..
E dinesh@opensecurityalliance.org
@bizsprite
L: linkedin.com/in/dineshbareja
+91.9769890505
dineshobareja
dineshobareja
opensecurityalliance.org
dineshbareja.com
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
This document has been created by IndiaWatch., Open Security Alliance., Dinesh O Bareja, EzRisk and
released in the public domain under Creative Commons License (Attribution- Noncommercial 2.5 India)
http://creativecommons.org/licenses/by-nc-sa/2.5/in/
Disclaimer and Copyright
The information and practices listed in this document are provided as is and for guidance purposes only and should not be construed
to be a standard (unless mentioned otherwise). Readers are urged to make informed decisions before adopting the information given
in this document.
The author(s) may not be held responsible, or liable, in any event and for any issues arising out of the use of the information and / or
guidelines included in this document. Further, we do not give any warranty on accuracy, completeness, functionality, usefulness or
other assurances as to the content in the document. We disclaim all responsibility for any losses, damage caused or attributed, directly
or indirectly, from reliance on and the use of such information.
Readers are welcome to provide feedback to the authors using the contact information provided in this document. This document has
been prepared for general public distribution so all animations have been converted to static images.
Graphics and images are usually obtained from the internet with every effort being made to ensure they are from royalty-free sources;
other images are usually acknowledged by us. Errors may be expected in this practice, however, this is not intentional. - we respect
creative rights and request owner(s) to inform us of any inadvertent omission. Trademarks or companies may be displayed, or
mentioned, with the purpose of establishing a point or for better understanding and we do not claim any exclusivity or relationship
with their respective owners.

Más contenido relacionado

La actualidad más candente

IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk MitigationMukalele Rogers
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat ModelingDanny Wong
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 

La actualidad más candente (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 

Similar a WFH Cybersecurity Basics Employees and Employers

Business as usual, but from home instead!
Business as usual, but from home instead!Business as usual, but from home instead!
Business as usual, but from home instead!robertgibbons
 
How to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of CoronavirusHow to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of CoronavirusEvaris Solutions Plc
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19Net at Work
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureIIMBNSRCEL
 
How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveChristi Williams (Keating)
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015Luis Moreno Campos
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely Case IQ
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 

Similar a WFH Cybersecurity Basics Employees and Employers (20)

Business as usual, but from home instead!
Business as usual, but from home instead!Business as usual, but from home instead!
Business as usual, but from home instead!
 
How to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of CoronavirusHow to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of Coronavirus
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Pcs academy october_2020_security
Pcs academy october_2020_securityPcs academy october_2020_security
Pcs academy october_2020_security
 
Pcs security waves
Pcs security wavesPcs security waves
Pcs security waves
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 
How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay Productive
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely
 
Team black
Team blackTeam black
Team black
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 

Más de Dinesh O Bareja

Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 

Más de Dinesh O Bareja (20)

Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 

Último

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 

Último (20)

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 

WFH Cybersecurity Basics Employees and Employers

  • 1. Cyber Security Basics Work From Home Cybersecurity Basics for Employees and Employers
  • 2. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Dinesh O Bareja CISA, CISM, ITIL, ISMS, Cert ERM, Cert IPR • COO – Open Security Alliance • Researcher – indiawatch.in • Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd -- Cyber Peace Foundation • Co-Founder – Indian Honeynet Project • Ex Cyber Surveillance Advisor – CDRC (Jharkhand Police – Special Branch) Enterprise & Government Policy Development; Cyber Security Strategy, Design, Architecture; Current State Security Assessment, Audit & Optimization; Governance, Risk Management ABOUT ME
  • 3. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 4. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 5. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 6. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 7. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 We Went From Here
  • 8. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 To Here!
  • 9. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Our Happy Meetings Were This
  • 10. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 And Now
  • 11. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 7 Months Later • We (workers) are not so happy with WFH because • Long and uncontrolled work hours • Domestic issues • Work environment may not be friendly… etc • We, (Employers) are happy because • Situation has shown WFH works and employees work • Business model is being re- designed for BIG financial saving • Productivity levels and unlimited availability of workforce… etc
  • 12. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 The Present Situation • All employers were FORCED to send employees home and ask them to work from home • All Employees rejoiced ! Now they have finally got what they had been asking for! For a long time !! (But… it was against company policy or only for senior management) • Working from home is being called the new normal … to make everyone happy ! • From the information security standpoint – the threat surface has increased, new risks have cropped up, the responsibility for secure working is greater
  • 13. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Crackers (Malicious Hackers), Cyber criminals are happy • Plenty of targets • Weak defenses • Thousands of paths • Multiple points at home • Users not in controlled environment • Social engineering will work taking advantage of loneliness and psychological weaknesses • Easy spear phishing / whaling • Exploit corona virus FUD factor, fake news, information overload
  • 14. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Cyber criminals are opportunistic and will look to exploit fears, and this has undoubtedly been the case with the Coronavirus outbreak
  • 15. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 A Target Without Boundaries Stay Safe… Don’t Become One
  • 16. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Target Without Boundaries Stay Safe… Don’t Become One
  • 17. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Your Workspace & Workplace
  • 18. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Workspace (place) • Hide the wall, shelves, utensils behind you with a backdrop • Light up the desk and shut down from behind you. Poorly lit video calls are not good
  • 19. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – YOU & YOUR NEW NORMAL • Obtain and keep a list of names, phone numbers, email and WhatsApp, so you have the correct contact coordinates for HoD, TL’s and team members from your department, and the following: • Stay alert for out-of-the ordinary events when browsing, working on your computer, phone calls etc • If you fall victim report it to your IT / IS support immediately • IT • IS • BC/DR • HR • Admin • Finance • HelpDesk • Legal • Police • Fire • Courier • Taxi
  • 20. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Workspace (place) • Keep a workspace / place which is quiet and private • If not possible, keep your self on mute always! • Clear and clean desk … de-clutter • Consider addition of a monitor and UPS to your home office • Secure your wifi (whitelist all devices, set a strong pwd) • For your official computer - set a password and lockout screen • Get a good ergonomic chair – you are going to be sitting in a chair much more than you ever sat in office!
  • 21. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Workspace (place) • Wear a decent shirt always before starting your work day • Keep a glass of water nearby • Educating family members about life in the new normal ! • Discuss and share the rules of working with all family members • Tell them what your employer expects and request their help • Keep children, adults, water and food away from your workspace • Do not have your meals at your workstation and do not eat when on a call
  • 22. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Your Devices
  • 23. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Device(s) • Your ant-virus, system updates should happen automatically (if configured so by your IT team) do not stop the process • Do not install any software (crack, freeware, unlicensed), pirated movies, or download pirated books, images • Stay away from torrents, dark web, ecomm and free download sites • So not click any links in emails (or website) – Stop, Read, Verify, Click • Make sure your device is configured securely by the IT team and has all the authorized applications • Do not plug in any other devices or USB into your official device • Keep access to yourself and do not use for any domestic work
  • 24. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Communication Channels
  • 25. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Communication Channels • Get a good mic and headset … test it to see it works good with your video conferencing application • Try to get a noise cancelling headset (does not matter whether it is children playing around, there are a bit too many noises in or environment) • Consider purchasing a webcam and a bright table lamp so that your video quality is good
  • 26. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Communication Channels • Upgrade your broadband connection • Subscribe to a good data plan – keep this as a backup to your broadband connection • Walk around your home to see where you get the best cellphone signal so you know where you should be if you are on a phone call • Do not trust emails with links claiming to have important updates (bogus links may lead to devices being infected) • Do not share company information with anyone who calls you or connects on social media • Remember email, phone numbers, voice can be spoofed • When asked for such information, hang up and call back (use the phone numbers in your Comm list)
  • 27. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Your Work
  • 28. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Work • Make sure your anti virus is working and updated • Allow your system update to happen, do not postpone • Save your work with passwords • Save to your official cloud space • If you are an independent person working from home, back up to an external device periodically (weekly?) • Change settings on your office applications to save your work in real time or every 5 minutes (or less) • Be extra vigilant – do not open attachments from unknown sources, forward to IT/IS team
  • 29. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Mind Body & Soul
  • 30. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 • Take a break from your chair • Live by the clock (does 9 to 5 work? Make it work, draw the line) • Meditate, pray, paint, sing, chores, play music, carrom, scrabble.. whatever … keep your life intact • Exercise, walk, cycle, climb stairs • Meals with family • Go slow on TV shows, movies Secure Yourself – Your Body, Mind & Soul
  • 31. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Employer Support
  • 32. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Employer Support Obligations • Set work timings and dissuade late evening meetings • Provide video conferencing account • Communication protocol – ask the person to call back (do not feel offended if the person does not share information and insists on calling back) • Personalized Communication Directory with names etc • WFH code of conduct and Policy • Acceptable Use policy and procedure for WFH assets, VPN • BCP and DR procedure for WFH • Advisories, Awareness training • Employee inclusion programs • Company announcements, and new successes … etc Provide Policies and Procedures that include
  • 33. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Reality is Humorous
  • 34. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 ABOUT ME MY CONTACT INFORMATION Information Security professional working hard to stay abreast of technology, risks, threats, opportunities and looks forward to the excitement of the future.. E dinesh@opensecurityalliance.org @bizsprite L: linkedin.com/in/dineshbareja +91.9769890505 dineshobareja dineshobareja opensecurityalliance.org dineshbareja.com
  • 35. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 36. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 This document has been created by IndiaWatch., Open Security Alliance., Dinesh O Bareja, EzRisk and released in the public domain under Creative Commons License (Attribution- Noncommercial 2.5 India) http://creativecommons.org/licenses/by-nc-sa/2.5/in/ Disclaimer and Copyright The information and practices listed in this document are provided as is and for guidance purposes only and should not be construed to be a standard (unless mentioned otherwise). Readers are urged to make informed decisions before adopting the information given in this document. The author(s) may not be held responsible, or liable, in any event and for any issues arising out of the use of the information and / or guidelines included in this document. Further, we do not give any warranty on accuracy, completeness, functionality, usefulness or other assurances as to the content in the document. We disclaim all responsibility for any losses, damage caused or attributed, directly or indirectly, from reliance on and the use of such information. Readers are welcome to provide feedback to the authors using the contact information provided in this document. This document has been prepared for general public distribution so all animations have been converted to static images. Graphics and images are usually obtained from the internet with every effort being made to ensure they are from royalty-free sources; other images are usually acknowledged by us. Errors may be expected in this practice, however, this is not intentional. - we respect creative rights and request owner(s) to inform us of any inadvertent omission. Trademarks or companies may be displayed, or mentioned, with the purpose of establishing a point or for better understanding and we do not claim any exclusivity or relationship with their respective owners.