Wednesday, December 25, 2024

Latest Posts:

Double Triumph: Sectigo Celebrates Top Honors in Product and Workplace Excellence

Sectigo, a global leader in digital certificates and automated Certificate Lifecycle Management (CLM)...

Axians UK’s Experience Hub to drive future growth after standout year

Axians UK, a prominent technology services partner, today announced the opening of its...

How Insurance Companies Can Support Customers Throughout Their Lives

The shift from a reactive model to a proactive, prevention-focused approach is...

Expert reveals how to protect your business from COVID-19 Cyber-Attacks

An alarming number of users’ machines have now become compromised since working from home. Darren James, Specops Software’s cyber security expert, delves into the potential reasons for these rises, alongside tips for ensuring security safety across businesses: 

 

Compromised users’ machines could be due to several factors: 

  • Rapid deployment of non-company image devices – a lot of laptops have been purchased/rented as well as bringing personal devices permitted. Therefore, these devices have been deployed without having the corporate image installed, which means that the protections normally in place e.g. AV, Patching, Group Policy etc. will not be available. 
  • As people work from home their corporate devices might not be patched as frequently as when on the company network, hence exposing people to more recent threats. 
  • There has also been a large increase in COVID-19-related spam emails and texts which in turn will create a larger attack opportunity for the wider hacking community. 
  • Particularly in the BYOD scenario a device might be shared by other members of the family, therefore posing a greater risk of less IT-savvy users clicking on malicious links and downloading malicious software. 
  • In general, IT departments are not well prepared for mass remote working, meaning out of date remote access solutions are likely being used on a mass scale. 

How can organisations best deal with these sorts of threats? 

If the above scenarios have already occurred in your organisation, at the very least keep in contact with your workforce. You can also raise the profile of keeping the company safe from IT threats by considering the following: 

  • Keep employee devices up to date with the latest patches and AV solutions. 
  • Encourage employees against sharing their work device with other family members e.g. children. 
  • Make sure home Wi-Fi passwords are changed from the defaults. 
  • Ensure to power off devices when not in use. 

  

How should organisations adapt/change? 

Adapting to this “new normal” as fast as possible is important, to prevent future breaches and ensure success. 

Keep security at the forefront of all decisions by reviewing firewall rules, checking that your VPN protocols are secure, and introducing AppLocker policies to restrict what users can run under their accounts. You should also consider removing global and local admin rights on workstations. 

But crucially, don’t forget the basics! Maintain a good password policy, make sure your users’ passwords haven’t been compromised and check your logs for unusual activity. You should also consider introducing multi-factor authentication (MFA) for remote workers and look at ways of verifying users’ identities. 

Are we facing a cyber security pandemic? I believe that we are constantly in a cyber security pandemic; the current global crisis has just exacerbated it and provided opportunistic cyber criminals even more opportunity to prey on society and make a quick buck. 

 

For more information visit: specopssoft.com  

For more Technology and Business news follow i-invest Online. 

Latest

Double Triumph: Sectigo Celebrates Top Honors in Product and Workplace Excellence

Sectigo, a global leader in digital certificates and automated Certificate Lifecycle Management (CLM)...

Axians UK’s Experience Hub to drive future growth after standout year

Axians UK, a prominent technology services partner, today announced the opening of its...

How Insurance Companies Can Support Customers Throughout Their Lives

The shift from a reactive model to a proactive, prevention-focused approach is...

RAKIS 2024 Concludes with Visionary Strategies for RAK’s Future Growth

The second day of the Ras Al Khaimah Investment and Business Summit (RAKIS 2024)...

Subscribe To Our Content

Don't miss

Double Triumph: Sectigo Celebrates Top Honors in Product and Workplace Excellence

Sectigo, a global leader in digital certificates and automated Certificate Lifecycle Management (CLM)...

Axians UK’s Experience Hub to drive future growth after standout year

Axians UK, a prominent technology services partner, today announced the opening of its...

How Insurance Companies Can Support Customers Throughout Their Lives

The shift from a reactive model to a proactive, prevention-focused approach is...

RAKIS 2024 Concludes with Visionary Strategies for RAK’s Future Growth

The second day of the Ras Al Khaimah Investment and Business Summit (RAKIS 2024)...

Solace Unlocks Full Potential of Event-DrivenIntegration with Introduction of PubSub+ Micro-Integrations

New decentralised approach to integration makes it easier to get real-time data flowing...

Double Triumph: Sectigo Celebrates Top Honors in Product and Workplace Excellence

Sectigo, a global leader in digital certificates and automated Certificate Lifecycle Management (CLM)...

Axians UK’s Experience Hub to drive future growth after standout year

Axians UK, a prominent technology services partner, today announced the opening of its...

How Insurance Companies Can Support Customers Throughout Their Lives

The shift from a reactive model to a proactive, prevention-focused approach is...

LEAVE A REPLY

Please enter your comment!
Please enter your name here