SlideShare a Scribd company logo
1 of 16
Cyber security in remote
work
Who are we and why are we
talking about this subject?
We are a cybersecurity company based in Finland.
We started our business in 2009 and since then
have been working on preventing and researching
targeted attacks.
In addition to this specialization, we also offer
services catering to other areas of cybersecurity.
We have worked in the security field for over 10
years, so our tips are based on the knowledge and
skills that we have gained over the years.
2 www.fitsec.com 07.04.2020
The coronavirus impact on
remote work and cyber
security risks
o The coronavirus has had a huge impact
on all businesses worldwide.
o Over the last weeks the amount of
remote workers has grown enormously.
o There’s most likely a huge percentage of
employees out there who are working
remotely for the first time ever.
o This has put both employers and
employees in totally new situations.
3 www.fitsec.com 07.04.2020
Did you know that working remotely
significantly increases the risk of
getting your devices infected?
It is important to know how to keep your data safe!
And we are here to
help you!
For the next few weeks we are
going to give you some tips to
make your remote work as safe
as possible.
5 www.fitsec.com 07.04.2020
Let’s have a look at this week’s tips!
07.04.2020www.fitsec.com6
Are you ready?
When you are working,
always use your work devices
for work, never your personal
ones.
7 www.fitsec.com 07.04.2020
Also, do not use your work
devices for any personal things.
Why?
For example, do not use your work
computer to do online banking or
download files or applications that are
not work related.
If you use your personal computer
for work, there is a chance that
malicious software can jump from
your computer to your company’s
network.
07.04.2020www.fitsec.com8
The mobile phone or computer you
are using might have weak or non-
existent security and protection
against malicious software.
We’ll tell you
why!
Next week, we are looking at securing
devices in greater detail. Follow us so you
won’t miss it!
When you are working
remotely, always use your
company’sVPN (Virtual
Private Network) when it is
available.
9 www.fitsec.com 07.04.2020
What is aVPN ? Why?AVPN creates an encrypted
connection between the
device and a network. It
ensures that your sensitive
data is transmitted safely
over the internet.
It is safer to do any work-related
activities with aVPN connection
since it is encrypted.This private
connection is essential to prevent
anyone from spying on your
connection or activities
07.04.2020www.fitsec.com10
If someone unwanted has access to
your network, they could spy on
your network traffic and your
sensitive work activities.This could
provide them with information to
attack/breach your company.
Remember, that even though you are working remotely, the only
thing that really has changed is your location.
Maintain the same carefulness as you would if you were at the
office.
07.04.2020www.fitsec.com11
Hey! Employers!The
next ones are for you!
07.04.2020www.fitsec.com12
Tips for employers
Most likely yourVPN has a limited load capacity.That is
why it is important that theVPN is only being used for
business matters to prevent the connection slowing
down or dropping completely. Communicate this clearly
to employees and block connections to streaming/social
sites if all else fails.
13 www.fitsec.com 07.04.2020
Tips for employers
AVPN establishes an encrypted connection. It is safer for
your company to have all the employees usingVPN.
Make it a requirement!
Employers can never be sure if their employee’s personal
computer is an information security risk. (It most likely
is)
That is why we stress the importance of using aVPN and
work devices for work.
14 www.fitsec.com 07.04.2020
Let us know in the comment
section or contact us on our
webpage:
www.fitsec.com
07.04.2020www.fitsec.com15
Are there any questions or
problems concerning
information security or remote
work you would like to get an
answer to?
07.04.2020www.fitsec.com16
oWe will be back next
week with new tips!
Our subject will be
securing devices.
oIn the meantime, you are more
than welcome to visit our
webpage www.fitsec.com and
see if our products and services
can help you.
Follow us so you’ll get a notification about
our new tips!

More Related Content

Similar to Cyber security tips for remote work

Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsNowSecure
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityNeil Parker
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipNetskope
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...NowSecure
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingRichard Kennedy
 
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Cyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraCyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraPranav Kumar
 

Similar to Cyber security tips for remote work (20)

Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)Intergen Smarts 9 (2005)
Intergen Smarts 9 (2005)
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraCyber attacks during COVID-19 Era
Cyber attacks during COVID-19 Era
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Cyber security tips for remote work

  • 1. Cyber security in remote work
  • 2. Who are we and why are we talking about this subject? We are a cybersecurity company based in Finland. We started our business in 2009 and since then have been working on preventing and researching targeted attacks. In addition to this specialization, we also offer services catering to other areas of cybersecurity. We have worked in the security field for over 10 years, so our tips are based on the knowledge and skills that we have gained over the years. 2 www.fitsec.com 07.04.2020
  • 3. The coronavirus impact on remote work and cyber security risks o The coronavirus has had a huge impact on all businesses worldwide. o Over the last weeks the amount of remote workers has grown enormously. o There’s most likely a huge percentage of employees out there who are working remotely for the first time ever. o This has put both employers and employees in totally new situations. 3 www.fitsec.com 07.04.2020
  • 4. Did you know that working remotely significantly increases the risk of getting your devices infected? It is important to know how to keep your data safe!
  • 5. And we are here to help you! For the next few weeks we are going to give you some tips to make your remote work as safe as possible. 5 www.fitsec.com 07.04.2020
  • 6. Let’s have a look at this week’s tips! 07.04.2020www.fitsec.com6 Are you ready?
  • 7. When you are working, always use your work devices for work, never your personal ones. 7 www.fitsec.com 07.04.2020 Also, do not use your work devices for any personal things. Why? For example, do not use your work computer to do online banking or download files or applications that are not work related.
  • 8. If you use your personal computer for work, there is a chance that malicious software can jump from your computer to your company’s network. 07.04.2020www.fitsec.com8 The mobile phone or computer you are using might have weak or non- existent security and protection against malicious software. We’ll tell you why! Next week, we are looking at securing devices in greater detail. Follow us so you won’t miss it!
  • 9. When you are working remotely, always use your company’sVPN (Virtual Private Network) when it is available. 9 www.fitsec.com 07.04.2020 What is aVPN ? Why?AVPN creates an encrypted connection between the device and a network. It ensures that your sensitive data is transmitted safely over the internet.
  • 10. It is safer to do any work-related activities with aVPN connection since it is encrypted.This private connection is essential to prevent anyone from spying on your connection or activities 07.04.2020www.fitsec.com10 If someone unwanted has access to your network, they could spy on your network traffic and your sensitive work activities.This could provide them with information to attack/breach your company.
  • 11. Remember, that even though you are working remotely, the only thing that really has changed is your location. Maintain the same carefulness as you would if you were at the office. 07.04.2020www.fitsec.com11
  • 12. Hey! Employers!The next ones are for you! 07.04.2020www.fitsec.com12
  • 13. Tips for employers Most likely yourVPN has a limited load capacity.That is why it is important that theVPN is only being used for business matters to prevent the connection slowing down or dropping completely. Communicate this clearly to employees and block connections to streaming/social sites if all else fails. 13 www.fitsec.com 07.04.2020
  • 14. Tips for employers AVPN establishes an encrypted connection. It is safer for your company to have all the employees usingVPN. Make it a requirement! Employers can never be sure if their employee’s personal computer is an information security risk. (It most likely is) That is why we stress the importance of using aVPN and work devices for work. 14 www.fitsec.com 07.04.2020
  • 15. Let us know in the comment section or contact us on our webpage: www.fitsec.com 07.04.2020www.fitsec.com15 Are there any questions or problems concerning information security or remote work you would like to get an answer to?
  • 16. 07.04.2020www.fitsec.com16 oWe will be back next week with new tips! Our subject will be securing devices. oIn the meantime, you are more than welcome to visit our webpage www.fitsec.com and see if our products and services can help you. Follow us so you’ll get a notification about our new tips!