Cybersecurity is never not an issue of the utmost importance, but in this time of near-universal work-from-home arrangements, IT departments are facing additional challenges on the security front. With a dispersed workforce using a variety of personal devices and home networks, security teams have an increased landscape to protect. Here are a few ways you and your employees can work more securely and in an efficient manner.
Use Work Devices As Much As Possible
Generous BYOD policies have blurred the line between work and personal devices. With this change in environment utilization organizations have created both great efficiencies and increased risk for the user and the data associated with the system. The transmission of data has grown in risk along with the location the data is stored. Organizations should be aware of the personal devices in use and the security configuration of that device. Where this is a cost reduction for the business it is a possible large expense following a data breach. Whenever possible users should use their personal devices for personal use and the organization should provide equipment for official business operations
Password Management and Two-Factor Authentication
Everyone in your organization, from top to bottom, needs to be vigilant and cautious when it comes to passwords. Institute password policies that support strong passwords and two-factor authentication, also make sure the devices themselves support some form of encryption.
Avoid Phishing Scams
Phishing is an ever-present risk that has become only more pronounced in the age of COVID. “We have seen an uptick in both traditional phishing, and more advanced phishing, since the pandemic began,” said Cisco Advisory CISO Wolfgang Goerlich. "In addition to the guidance about never sharing passwords, people should also take care when granting app permissions. Always verify the sender, the link, and the website.”
Offer Security Training
Rigorous security training should be included in your onboarding process and continue as refresher training yearly. Organizations should put into place role-specific training to accomplish security awareness training. Your company-wide policies and procedures are a key element in creating a comprehensive cyber hygiene program. When vulnerabilities are observed, timely remediation is a key element to continued security. Every person in your organization is a responsible team member, and they should know what to look out for and how to look out for it.
Monitor Your AV/UC Environment
With more and more sensitive and confidential information travelling through your Unified Communication systems and AV devices, it is critical that you implement an enterprise-grade security solution capable of keeping tabs on your geographically dispersed array of equipment. SecureEdge fits the bill perfectly. Powered by Dark Cubed, SecureEdge monitors, detects, alerts and blocks malicious traffic through all of your devices. It protects your AV/UC environment against such common attacks as denial of service, botnets, eavesdropping and LAN hopping. As intuitive and user-friendly as it is powerful, SecureEdge can keep you safe from the shapeshifting cybersecurity threats of tomorrow.
Learn more about SecureEdge and other security services and please contact us if you have any questions. We will have one of our experts get back to you shortly.
Comments