What are some security measures you can take in order to make sure you don’t get the “ransomhack” on your computer?

Nelson Cicchitto, Avatier founder and CEO says: The work-from-home world introduces new IT security challenges. To keep up with these challenges, it is critical to understand the challenge first. The latest industry research shows that data breaches are now costing companies millions of dollars. In the United States, each data breach now costs about $8.6 […]

Thrive Global invites voices from many spheres to share their perspectives on our Community platform. Community stories are not commissioned by our editorial team, and opinions expressed by Community contributors do not reflect the opinions of Thrive Global or its employees. More information on our Community guidelines is available here.

Nelson Cicchitto, Avatier founder and CEO says:

The work-from-home world introduces new IT security challenges. To keep up with these challenges, it is critical to understand the challenge first. The latest industry research shows that data breaches are now costing companies millions of dollars. In the United States, each data breach now costs about $8.6 million. On a global level, the cost is $3.9 million per data breach. Unfortunately, the COVID-19 pandemic has made IT security even worse.

With so many threats on the horizon, it can be challenging to know where to focus. Fortunately, you can achieve a lot by focusing on two types of threats: phishing and malware. Applying training and software to mitigate these threats is vital to keeping your data safe.

There are multiple ways to address the reality of large-scale remote worker security. Let’s assume that a significant share of your workforce wishes to work remotely for the foreseeable future. In that situation, IT leaders need practice options. Consider the following solutions to make IT security effective in a remote work

1. Prevent Identity-related Security Breaches
Ultimately, preventing identity-related cybersecurity breaches requires a full identity and access management program. For example, you need to provide password management training to employees so they know how to create robust passwords. IT needs the right tools like Avatier Identity Anywhere to systematically monitor identity in the organization.

2. Prevent Security Problems Related To Access Privileges
An account breach of a single user with extensive access privileges can do a lot of damage to your organization. That’s why managing access privileges is a critical security practice. However, it is not realistic to expect IT staff to review security privileges for every user manually. Instead, you need to leverage a specialized IT security software solution like Compliance Auditor.

Tip: When employees leave their current job for a different role in the company or leave the company, their access privileges need to be updated quickly. To systematize this practice, engage with human resources to determine when employees change or leave the organization. For more guidance on this topic, check out our article: Reduce Employee Fraud Risk: 5 Ways to Improve Offboarding.

3. Implement Better Password Security for a Remote Workforce
With a remote workforce, the right tools are needed to reset locally cached passwords. The user’s computer may keep a critical corporate password stored locally, which creates a security risk and an IT challenge. You can solve this risk by using Identity Anywhere to secure credentials across different computing environments, including Windows and iOS.

4. Use VPN Security To Reduce Attacks

A virtual private network (VPN) is a vital tool to improve your security. On its own, it will not prevent all attacks. Nonetheless, it is a powerful tool that needs to be in place to support remote employee security. Find out more about the benefits of VPN technology in our article: What You Need To Know About VPN Security.

Tip: Make sure your employees know how to turn on their VPN security. Since using a VPN can impact internet speeds, some employees may be tempted to skip using a VPN. It is important to reinforce the value of using a VPN to maintain security.

5. Test Your IT Security Controls Regularly

IT security threats keep changing every month. You can find out if your practices have a gap by getting attacked, or you can protectively detect that gap yourself. To minimize the chance of an expensive data breach, use an IT security testing program that considers remote worker security concerns.

For example, you might decide to give employees a knowledge test quarterly to see if they are aware of phishing risks. Some companies also send simulated phishing messages to their employees to evaluate whether employees are equipped to detect and respond to these such threats. Finally, check whether your controls are working. For example, are managers reviewing user access privileges in their department regularly? Such access reviews can go a long way toward closing security vulnerabilities before they become a problem.

6. Review Remote Employee Physical Security Practices
The security systems and practices outlined above cover the fundamentals of adequate IT security for remote work. However, it is also worth taking another look at physical security practices. For example, do you have a process to prevent employees from printing sensitive documents at home? If not, applying controls to such printing is worth taking a closer look at since it may lead to unauthorized data disclosure.

Share your comments below. Please read our commenting guidelines before posting. If you have a concern about a comment, report it here.

You might also like...

Community//

“Establish an audit trail.” With Jason Remillard & Noah Johnson

by Jason Remillard
Community//

“You can PREVENT most Data Breaches”, with Jason Remilard and Paul Katzoff

by Jason Remillard
Community//

“Knowing an action must occur” With Jason Remillard & Stephen Moore

by Jason Remillard
We use cookies on our site to give you the best experience possible. By continuing to browse the site, you agree to this use. For more information on how we use cookies, see our Privacy Policy.