Top Tips for Remote Workforce Cybersecurity

June 5, 2020 | COVID-19 crisis Denny Fisher, Chief Client Experience Officer, ACS,

Many organizations discovered during the pandemic that employees were able to stay productive while working remotely. All indications suggest that the ability to work remotely will be a common demand from employees moving forward. Alternatively, organizations struggling due to the pandemic could reduce overhead costs by reducing office space and encouraging or mandating certain roles transition to remote positions.

Below are tips for how to conduct business securely with a remote workforce.

1. Multi-Factor Authentication (MFA): MFA is a gatekeeper to your organization’s applications, devices and information. MFA requires the user to input their normal password, and also provide a unique passcode that is timesensitive and sent to their phone or another gateway. Because a hacker doesn’t have access to the unique code, their ability to infiltrate corporate systems are mitigated even if they have the user’s password.

2. Antivirus and Antimalware: It’s a tale as old as time but always relevant. Antivirus and antimalware are the first step in preventing attacks. These applications should be installed on company devices and personal devices.

3. Home Infrastructure: Most home internet contracts come with a router. Even if it has “firewall” capabilities, the truth is home routers only direct internet traffic, much like a traffic cop at a festival. It tells information about where to go but doesn’t inspect it. A firewall will inspect the information before letting it pass, much like a border patrol officer.

4. Cybersecurity Training: The biggest defense against cybercriminals is a well-trained army—your employees. Using a training platform that simulates malicious emails, texts, files, and phone messages to educate your employees and identify your weakest links is one of the most economical and effective tools at your disposal.

While organizations have been distracted with the pandemic, hackers have been hyper-focused on secretly implanting viruses and malicious code. They are lying in wait until businesses have recovered and can pay their ransom demands. By taking these steps, your organization can mitigate the impact and likelihood of a successful cyber-attack.