Top 6 Home Cybersecurity Techniques for Remote Workers

Top-6-Remote-Working-Techniques

Invisible but deadly – In just a few weeks, the sudden emergence and subsequent global spread of Coronavirus (COVID-19) has changed the world as we know it. In the white-collar world, as social distancing techniques are being encouraged, the government urges employees to work from home wherever possible.

On the surface, the power of the Internet would seem to make it relatively simple for many of your workers to carry out their regular desk-job duties from the dining room table or the comfort of their couch.

Conceivably, they could generate roughly the same output in such a way without causing too much disruption to your clients, investors, partners, and business. However, moving at short notice from a secure and trusted office environment to remote working can create cybersecurity risks – especially if, like many businesses, you’ve been caught off guard and have no tried and tested work-from-home policy in place.

This post will cover the concept of cybersecurity, different types of cybersecurity issues, some practices remote workers can implement to improve cybersecurity, and how Zsah’s trustworthy service can help keep your organisation secure.

Table of Contents
    Add a header to begin generating the table of contents

    What is cybersecurity?

    Cybersecurity Threats to Remote Workers

    Cybersecurity risks are, of course, always rife, and a constant threat to businesses. However, as more and more of your workforce starts working from home, new challenges are presented. Without proper policies, procedures, training, and defence systems in place, not only can your remote workers have their own privacy jeopardised, but company security can come under threat too.

    Some Examples of Cybersecurity Issues

    Phishing Scams

    Already, opportunist cybercriminals are using the coronavirus to launch attacks targeting remote workers. Experts at the NCSC – the cyber arm of GCHQ – have spotted a range of scams and cybersecurity threats that look to take advantage of the outbreak in recent weeks, with COVID-19-related phishing scams emerging as a particular threat.

    Such scams involve cybercriminals sending emails claiming to be from legitimate organisations – or even your company’s own office – with information about the coronavirus. The email message will ask your employee to click on a link or open an attachment to access the information.

    If the worker clicks on the attachment or embedded link, they trigger a download of malicious software (malware). This malware could then, for example, allow the criminal to take control of the worker’s device, log their keystrokes, install ransomware, or access private or company data.

    “The NCSC has seen an increase in the registration of webpages relating to the coronavirus suggesting that cybercriminals are likely to be taking advantage of the outbreak.

    These attacks are versatile and can be conducted through various media, adapted to different sectors and monetised via multiple means, including ransomware, credential theft, bitcoin or fraud.

    Continued global susceptibility to phishing will probably make this approach a persistent and attractive technique for cybercriminals. Moreover, if the outbreak intensifies, it is highly likely that the volume of such attacks will rise.” said the NCSC.

    What Do Phishing Emails Look Like?

    COVID-19-themed phishing emails can take many forms – including workplace policy emails.

    Such emails are “dressed up” to appear as if they come from inside your company and contain information or instructions on what workers should do with regards to the outbreak. One phishing email targeting workplace email accounts, for example, was found to contain a malicious link supposedly to a “Communicable Disease Management Policy” issued by HR departments. By clicking on the link, however, the worker triggers a malware download.

    Phishing Emails

    (Image source: norton.com)

    Across the pond, cybercriminals have also gone down the route of impersonating the US Centers for Disease Control (CDC). The message advises recipients to click on a malicious link purporting to list coronavirus cases in their area.

    Phishing Emails CDC

    (Image source: norton.com)

    Other fraudulent health advice emails are also in circulation. They purport to be from a medical institution like the World Health Organization (WHO) and are designed to trick recipients into opening a malicious attachment.

    Phishing Emails -2

    (Image source: norton.com)

    Still more target workers from specific sectors to increase the likelihood of success. Researchers at Proofpoint, for instance, found that attackers had been sending an email with a malicious Microsoft Word document attached to workers in the shipping industry. The document seeks to exploit a Microsoft Office vulnerability and install AZORult – an information-stealing malware – on the user’s device.

    Phishing Emails Coronavirus

    (Image source: proofpoint.com)

    Personal Devices

    Working from home will likely mean that many of your employees will have to rely on their personal devices – computers, smartphones and tablets, plus any internet access hardware – to complete work tasks.

    The trouble here is that these will no doubt lack the tools already built in to your business office networks, such as strong antivirus software, customised firewalls, and automatic online backup solutions. This creates a significant cybersecurity risk as it increases the likelihood of malware finding its way onto devices and both personal and work-related data being breached.

    An alternative option is for your company to provide new devices to your employees. In this way, you could ensure that they have all the necessary defence mechanisms installed – though this may of course be a prohibitively expensive strategy to deploy, especially during this difficult time.

    Unsecured Wi-Fi Networks

    Since the whole idea behind remote working during the coronavirus pandemic is to promote social distancing, your employees should be aiming to avoid co-working and shared-space environments while out of the office. However, it may be the case that some team members may either choose or be forced to use unsecured public Wi-Fi networks from time to time. Unfortunately, these are prime spots for malicious actors to spy on internet traffic and steal confidential information.

    An attacker could potentially position him/herself between the worker and the connection point – so, instead of talking directly with the hotspot, all information sent over the internet is intercepted by the hacker, including emails, credit card information, and security credentials to your business network. In addition, an attacker could use an unsecured Wi-Fi connection to distribute malware.

    Most employees will be working from home, however, where they should be able to secure their Wi-Fi. Most home Wi-Fi systems are well-secured these days, though some older installations may not be. As is the case with public networks, with an insecure home connection, an attacker in the near vicinity can potentially snoop internet traffic and distribute malware.

    What are the Home Cybersecurity Techniques for Remote Workers?

    While you, as a company, form work-from-home plans for your newly remote workforce, cybersecurity will of course be one of the most important items in the programme. However, in this time of crisis, it may be a case of trying to build the plane as it flies – your remote work cybersecurity policies and procedures aren’t yet fully formed, but you must insist your staff work from home regardless.

    Thankfully, even without a fully-formed strategy ready to deploy, there are a number of simple yet effective cybersecurity measures your remote workers can take to protect themselves and your business immediately while working from home.   

    Technique #1: Recognise and Avoid Phishing Emails

    The first thing here is to make sure your remote workers are aware of the growing threat.

    Why?

    With the rise in the number of people working from home, cybercriminals are actively trying to cash in on the trend. As such, phishing emails – as well as voicemails (vishing) and SMS text messages (smishing) – are targeting remote workers looking to steal their personal information or gain access to company accounts.

    Communicate with your workforce so they are aware of this and are alert to the potential cybersecurity threats presented by any message that arrives in their inbox.

    Workers must be told not to follow any links, click on any attachments, or reply to any messages until they are 100% certain that the sender is genuine.

    Tips: Checklist for spotting fraudulent phishing emails

    • Look out for poor grammar, spelling and punctuation, and other signs of poor quality (such as design) that you wouldn’t normally expect from the organisation the email is supposed to have come from.
    • Beware of requests for personal or company information, as this is precisely what cybercriminals are after. Legitimate agencies won’t ask for login credentials, credit card information, or other such data. Do not respond.
    • Look out for veiled threats that ask you to “act urgently”. Phishing emails often demand immediate action – “send these details within 24 hours” or “click here immediately”. The goal is either to get you to provide personal or company information, or otherwise trigger a malware download.
    • Beware of generic greetings like “Sir/Madam”, “Colleague”, “Friend”, or “All”. This is a clear sign that the sender does not know you, and may indicate a phishing scam.
    • Check any links provided by hovering your mouse cursor (without clicking) over the URL to see where it leads. Sometimes, it will be clear that the website is not genuine – though bear in mind that cybercriminals will create links that closely resemble legitimate addresses. If you are in any doubt at all, do not click.

    Technique #2: Secure Home Routers

    Hackers will be on the lookout for remote workers with vulnerable home networks.

    Why?

    The harder it is for a cybercriminal to breach your workers’ defenses, however, the less likely they are to bother trying and will move on to alternative targets.

    Tips: Steps to firm up the security of your wireless routers

    1. Pick a new username (many routers ship with the same default username from the manufacturer, such as “admin”) along with a complex password that contains letters, numbers and symbols.
    2. Ensure firmware updates from the manufacturer are routinely installed so that security vulnerabilities can be patched. 
    3. Use the highest levels of encryption available – such as WPA2 or WPA3.
    4. Restrict inbound and outbound traffic.
    5. Disable all unused services.

    Technique #3: Set Up Firewalls

    It’s likely that your remote workers’ devices and routers will have built-in firewalls, which create a barrier of defence between the device and the internet by closing ports to communication.

    Why?

    Firewalls help prevent malicious programmes entering and can stop data leaking from devices. Ensure that your remote workers’ enable these built-in firewalls if they’re present.

    If any device being used for work doesn’t have a built-in firewall, the worker must install one from a third-party provider immediately. Even if they do, however, an additional third-party firewall can offer added protection and you should encourage your remote workforce to install one.

    Tips: Reliable firewall options

    Some good free and paid firewall options for 2020 can be found here

    Technique #4: Install Antivirus Software

    While we may be waiting 12 months or possibly much longer for a coronavirus vaccine, strong antivirus software that will protect your remote workers against malware already exists – and they should use it.

    Why?

    While firewalls act as a good first line of defence, they are not perfect, and installing antivirus software as well as an additional firewall increases your workers’ chances of keeping their equipment malware-free.

    Tips: Recommended antivirus tools

    Some excellent choices for free antivirus tools can be found here, and paid options here.

    Best Free Antivirus Software

    (Image source: uk.pcmag.com)

    Best Antivirus Software

    (Image source: uk.pcmag.com)

    Technique #5: Use a Virtual Private Network (VPN)

    Using a VPN is a simple yet hugely effective home cybersecurity technique for remote workers.

    Why?

    A VPN will encrypt all traffic going to and from your employees’ devices, rendering it unreadable to anyone who should try to intercept it, thereby keeping your company information safe.

    Tips: Create a personal tunnel for internet traffic

    By creating a persona and encrypted tunnel for internet traffic to go through that no one else can access, you can effectively help secure your information. It’s important to note, however, that using a VPN can slow down internet speeds, so it’s important to choose one known not only for its high security, but speed and reliability as well.

    From network security monitoring and management to centralized policy-based email encryption solutions, to threat analytics and detection, Zsah is now offering a discounted cloud and SaaS-based cyber-security consultancy services to help keep your organisation secure. Click to learn more.

    VPN cybersecurity

    (Image source: wpbeginner.com)

    Comapritech provides a list of robust VPNs for remote workers in 2020, which can be found here.

    Technique #6: Use Strong Passwords

    Last, but by no means least, is to ensure all accounts are protected with strong passwords.

    Why?

    80% of data breaches involve abuse and misuse of privileged credentials, making employee passwords one of the biggest ongoing threats to corporate security – whether the employees using them are remote working or not.

    Depending on your business, the number of applications your employees may need to use to perform their duties can reach dozens if not hundreds. Effective identity management is therefore crucial. Strong, unique passwords should be used for every application – but password reuse is by no means uncommon.

    This means that if a cybercriminal were to compromise one password, they could use credential stuffing techniques to try and log into other online accounts and steal any data they find.

    Tips: The use of password managers

    A robust password policy must therefore be enforced. It is of course almost impossible for employees to remember a long list of strong passwords with strings of random letters, numbers and symbols. As such, the use of password managers which create, remember and autofill passwords should be endorsed.

    best password manager

    (Image source: uk.pcmag.com)

    Zsah’s Trustworthy Enterprise Cybersecurity Services

    Like it or not, we’re facing a new world of remote working for the foreseeable future. The coronavirus is forcing enterprises to rethink the way they do business and create robust new policies for remote workers.

    It is imperative that your business’s cybersecurity is not thrown into jeopardy at this time of crisis. While you will hopefully build a strong work-from-home cybersecurity plan eventually, the speed at which social distancing measures have become necessary to prevent the spread of COVID-19 may have left your business vulnerable as you send your employees home to work using their own devices. It is therefore imperative that you communicate the above cybersecurity techniques to your workforce so they can start implementing them immediately. 

    Even so, it is now more crucial than ever to work with a high-quality cybersecurity services provider like Zsah to keep your organisation secure.

    Zsah's security experts can help you boost cyber resiliency and reduce risk by assessing your infrastructure and policies based on your business needs. If you need to implement a work from home strategy due to the coronavirus pandemic, our technical consultants are here to get you up and running in the shortest possible time to minimise impact to your business. 

    Get in touch today for more information.

    Leave a Comment