Online security alert as home working becomes the norm

Every time an employee connects to their corporate network from home, they’re creating possible access points for hackers to exploit.   Additionally these criminal organisations will target organisations workforces who are now working remotely as they will see this as a possible weakness.  By implementing additional layers of security businesses will steer clear of most sophisticated threat vectors.  Such as, ensuring cloud managed synchronised security products are rolled out to an organisations workforce.  Synchronised security consists of multiple security products which all communicate and work in unison to ensure optimal protections.  These include; Business class endpoint protection, Malware protection, encryption, and implementing multi-factor authentication.  All of these are useful measures to enhance home and workplace security.

Rules recommended by Biscuit partner ESET for safety online:

1. The first thing to check is that employees working remotely are using computers that connect to a virtual private network, or VPN. This should be the default on office-supplied laptops, but it is worth checking if employees have a valid subscription. If employees are using home computers, they should be encouraged to install a well-established VPN network with good reviews. This is a secure way of transporting private data across unknown networks, even via a home router. Instead of worrying about the security of individual apps on a device, a VPN connection can protect against multiple attacks. A secure VPN connection can stop your passwords and IP address from being exposed.

2. If workers have to use public Wi-Fi, they must be reminded not to use it without a VPN. Better still, they should try to use a hotspot phone connection instead, which can be faster and more secure. Taking simple steps, such as avoiding public Wi-Fi wherever possible, can go a long way in mitigating risks – so employers should ensure that they are actively reminding employees to choose secure networks.

3. If employees are using personal computers, it is essential to use the latest operating system and make sure it is up-to-date. Microsoft ended mainstream support for Windows 7 recently, so you must remember to switch to other operating models that have full supplier support. All PC peripherals used, such as USBs, must have an antivirus installed to contain any form of malware that could be transmitted into the network. Also, it’s always a good idea to scan any machine for malware before it is used for work purposes.

4. Using additional layers of security will help businesses to steer clear of most sophisticated threat vectors. Encrypting private data and implementing multi-factor authentication are useful measures to enhance home and workplace security.

5. Employers must ensure that workers are always aware of where vital data is stored and encourage them to reach out to IT support workers if anything seems out of the ordinary, especially when it involves financial transactions. Everyone in the company, regardless of seniority, needs to be extra vigilant when working remotely.

6. Create guides and instruction documents for new software that employees will be using at home. The guide should highlights the dangers of cyber threats and outline security measures for employees to adhere to when working outside of the office space.

7. USB drives can contain large amounts of sensitive data, but are also easily lost and can be an easy way for malware to find its way onto PCs. 

Ask employees to transfer files using alternatives to USB such as cloud storage or collaboration tools.

Use a VPN or online or a secure online file-sharing program to access company data.

All employees are to be instructed to use strong, unique passwords on all accounts.

Protect access to data by requiring multifactor authentication

Use encryption 


A mass move to work from home in coronavirus crisis is creating an opening for hackers. Read the article here

If your business needs advice on measures to combat home working cyber vulnerability get in touch. 

We will assist you to put a home/remote working cybersecurity strategy in place.

twitter (2).png
facebook (3).png
linkedin (2).png
youtube (2).png
YTL Logo.png
Google business icon.png

01924 241 281

Copyright © 2020 Biscuit IT
All rights reserved.

  • LinkedIn
  • Facebook
  • Twitter
  • YouTube