- Home
- / Insights
- / FTI Journal
How to Protect Yourself and Your Employees in a Remote Work Environment
-
March 26, 2020
-
With offices closed due to the Coronavirus pandemic, and employees dispersed to remote work locations, FTI Cybersecurity offers advice to strengthen cybersecurity at this crucial moment in time.
The cascading implications of the COVID-19 outbreak on the global workforce are immense, not least of which is the shifting of entire teams to remote working environments. While priority number one is and should remain our collective health and safety, FTI Cybersecurity considers how the increased cybersecurity risks that come with the shift can be mitigated or avoided.
Helping employees protect themselves and your organization
- Make your employees aware of the increased threat: Employees who find themselves working from home or in a location other than the office must be aware of the specific cyber threats they face. Cyber criminals still attempt to exploit the human element when we're conducting business in the more secure environment of the office; but they can be even more dangerous when we’re deployed in a remote working environment. Encourage employees to review their cybersecurity awareness training, and if they have not participated in such a training, provide them with guidance on how to spot a phishing email, one of the simplest yet common forms of a cyber attack. The evidence of the last few weeks certainly suggests that malicious cyber actors are exploiting the public’s concerns about COVID-19 to launch social engineering attacks resulting in people opening harmful links or attachments.
- Protect vulnerable home networks: Many individuals are unfamiliar with the significant security vulnerabilities that are present on their home wireless networks. With relative ease, cyber criminals can use simple tools, like an antenna, to eavesdrop on Wi-Fi traffic from the comfort of their own cars. Prevent unwanted eavesdropping by using encryption whenever possible and only accessing secure websites (i.e., those that begin with “https”).
- Change your credentials: Many users often do not update the default login credentials on their Wi-Fi routers. These credentials are commonly known and shared by malicious actors, allowing easy entry to home networks. Anyone working from home should change their default credentials immediately. (Consult your device’s operating manual for guidance.) Unfortunately, login credentials aren’t the only way unauthorized users can gain entry.
- Secure all online devices: Any Internet-connected device can be used as an access point to a home network. This includes mobile devices, such as a cell phone or tablet, and smart devices, like Google Home or Amazon’s Alexa, which often have inherent vulnerabilities. Individuals regularly use the same Wi-Fi network for all of their home devices, meaning if a malicious actor is able to gain access to one device, they can then jump to others. Protect these devices by strengthening the complexity and uniqueness of their passwords.
- Keep your virtual desktop clean: Whether it’s intellectual property, customer information or confidential data, it’s common for individuals to have sensitive files on their work laptops. And even if an employee’s laptop is free of this type of data, if the machine is compromised, it can be leveraged to gain entry to their organization’s systems and networks. Additional cybersecurity measures need to be implemented when working remotely to ensure the protection of valuable information, such as not downloading sensitive information and transmitting this data via unencrypted email.
Three key steps to help your employees
- Use a virtual private network ("VPN") to allow for an additional layer of security and provide an encrypted connection. Even if cyber criminals are able to intercept network traffic, they will be unable to decipher the information if it’s encrypted.
- Implement multifactor authentication as a useful deterrent if malicious actors have a user’s credentials. This prevents stolen login information from being used, since the hacker would also need access to an individual’s physical device, like a mobile phone, to receive the secondary information needed to login.
- Keep operating platforms updated to ensure that gaps to known vulnerabilities in software/firmware and in-home devices are fixed. Cyber criminals routinely target low hanging fruit, usually existing gaps that have failed to be patched, since it’s an easy access point. Performing regular updates will eliminate obvious points of entry.
FTI Cybersecurity has published numerous cybersecurity articles highly relevant to the Coronavirus era: Here are steps to stay protected while connected to Wi-Fi, both at home and in public. This article offers 10 ways to protect mobile devices.
Just as cybersecurity threats are always evolving, so is the COVID-19 outbreak and related cyber attacks. The FTI Cybersecurity team will continue to track cyber activity related to the virus and provide regular guidance and support.
© Copyright 2020. The views expressed herein are those of the authors and do not necessarily represent the views of FTI Consulting, Inc. or its other professionals.
About The Journal
The FTI Journal publication offers deep and engaging insights to contextualize the issues that matter, and explores topics that will impact the risks your business faces and its reputation.
Published
March 26, 2020
Key Contacts
Senior Managing Director