SlideShare a Scribd company logo
1 of 3
Download to read offline
Working from home- How secure is it?
The current health crisis the world is witnessing today is truly unexpected and
unfortunate. We have never experienced a crisis like this before that forced us
to confine within the four walls of our house. When you know something like
this is going to happen, you can plan things accordingly, be it related to your
personal life or professional. But COVID-19 pandemic didn’t give us time to
prepare. Before we could realize what was happening, the entire world
entered into a lockdown.
Security
Most of the employees have started to work from home and this might pose
certain challenges, specifically on the security front. There are chances of
risks and the security team of an organization must identify the common risks
that might arise when employees are working remotely. The security team
should coordinate with the communication team and the latter must train the
employees on the risks and how to manage them. This will simplify the
process of security and motivate employees.
Even after training employees on these, they might encounter problems with
regard to security and will be in need of help. It is always advisable to answer
their queries in real-time using technology or forum, such as e-mail, Skype,
teams or any such platform. This will make security as approachable as
possible and will enable the security team to quickly identify and respond to
incidents.
Social engineering
The platform you are using to answer queries should have strong
authentication mechanisms; otherwise cyber attackers will see this as an
opportunity to socially engineer these platforms.
Social engineering attacks are one of the greatest risks that will arise when
employees work from home. The user will be prompted to make a mistake,
without their knowledge and during a time like this, when you get numerous
calls and emails related to the pandemic, it will be much easier to trick the
user. Chances of overlooking these scams are high. The solution is to train
employees on what social engineering is, how to identify it and what to do
once you identify one. Even though phishing is the most common form of
cyber attack, there are other modes as well and employees should be aware
of these.
Strong Passwords
Weak passwords have always been one of the top reasons for security
breaches and it makes the job of hacker pretty much easier. Below listed are
four key behaviors to manage this risk;
 Passphrases: Compared to passwords these are comparatively longer and
ensures added security.
 Unique passwords for all accounts: Do not give the same password to all the
accounts; they should be unique and strong.
 Password managers: This helps in storing and managing online credentials.
 MFA (Multi-Factor Authentication): User is given access only after successfully
entering two or more independent credentials.
Updated systems
The security team must see to it that the employees are using the latest
version of the operating system, applications and mobile apps. Everything
should be updated, as updation helps in patching security holes.
Tips
Here are some tips for you that can be useful while working from home;
 Here are some tips for you that can be useful while working from home;
 Change the default admin password, enable WPA2 encryption and use a strong
password for your wireless network
 All the devices connected to home network must be protected by a strong
password and should be updated. Systems should be locked while you are not
using it
 Both the operating system and applications must be patched and updated
 Do not discuss any confidential details with clients in public
 Keep your system in a secure place and also ensure to keep your screen private.
Position it away from other people
 Do not access any internet sites other than the access required
 Inform IT department if you come across any abnormal activity through emails or
systems
 If you are sharing any confidential information via emails, protect it with a
password. Share the password with the user in person and not through email.
 Do not use official laptop for personal use (internet or unauthorized applications
or software) and avoid carrying laptop to public places to work.
Above all, one should have the common sense to differentiate between
genuine things and scams. It is easy to fall prey to scams, but difficult to get
out of one.
Get Free Consultation
Working from home- How secure is it?
HLB HAMT
Level 18, City Tower-2,
Sheikh Zayed Road
PO Box 32665
Dubai – United Arab Emirates. Tel: +971 4 327 7775
E-mail: dubai@hlbhamt.com
www.hlbhamt.com

More Related Content

Similar to Working from home- How secure is it.pdf

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfYuriKasan
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 

Similar to Working from home- How secure is it.pdf (20)

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Secure End User
Secure End UserSecure End User
Secure End User
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdf
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 

More from Fiyona Nourin

Recent updates in UAE.pdf
Recent updates in UAE.pdfRecent updates in UAE.pdf
Recent updates in UAE.pdfFiyona Nourin
 
Excise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfExcise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfFiyona Nourin
 
Regulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfRegulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfFiyona Nourin
 
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfUAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfFiyona Nourin
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfFiyona Nourin
 
The Digital Future of HR.pdf
The Digital Future of HR.pdfThe Digital Future of HR.pdf
The Digital Future of HR.pdfFiyona Nourin
 
Blockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfBlockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfFiyona Nourin
 
Dubai Future District.pdf
Dubai Future District.pdfDubai Future District.pdf
Dubai Future District.pdfFiyona Nourin
 
New Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfNew Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfFiyona Nourin
 
2020 Towards the next 50.pdf
2020 Towards the next 50.pdf2020 Towards the next 50.pdf
2020 Towards the next 50.pdfFiyona Nourin
 
VAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfVAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfFiyona Nourin
 
The Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfThe Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfFiyona Nourin
 
DIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfDIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfFiyona Nourin
 
Timeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfTimeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfFiyona Nourin
 
VAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfVAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfFiyona Nourin
 
Transfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfTransfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfFiyona Nourin
 
Robotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfRobotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfFiyona Nourin
 
A Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfA Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfFiyona Nourin
 
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfAccountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfFiyona Nourin
 
Emerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdfEmerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdfFiyona Nourin
 

More from Fiyona Nourin (20)

Recent updates in UAE.pdf
Recent updates in UAE.pdfRecent updates in UAE.pdf
Recent updates in UAE.pdf
 
Excise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfExcise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdf
 
Regulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfRegulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdf
 
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfUAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
 
The Digital Future of HR.pdf
The Digital Future of HR.pdfThe Digital Future of HR.pdf
The Digital Future of HR.pdf
 
Blockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfBlockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdf
 
Dubai Future District.pdf
Dubai Future District.pdfDubai Future District.pdf
Dubai Future District.pdf
 
New Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfNew Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdf
 
2020 Towards the next 50.pdf
2020 Towards the next 50.pdf2020 Towards the next 50.pdf
2020 Towards the next 50.pdf
 
VAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfVAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdf
 
The Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfThe Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdf
 
DIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfDIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdf
 
Timeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfTimeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdf
 
VAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfVAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdf
 
Transfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfTransfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdf
 
Robotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfRobotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdf
 
A Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfA Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdf
 
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfAccountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdf
 
Emerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdfEmerging Technologies as an Audit Tool.pdf
Emerging Technologies as an Audit Tool.pdf
 

Recently uploaded

Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 

Recently uploaded (20)

Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 

Working from home- How secure is it.pdf

  • 1. Working from home- How secure is it? The current health crisis the world is witnessing today is truly unexpected and unfortunate. We have never experienced a crisis like this before that forced us to confine within the four walls of our house. When you know something like this is going to happen, you can plan things accordingly, be it related to your personal life or professional. But COVID-19 pandemic didn’t give us time to prepare. Before we could realize what was happening, the entire world entered into a lockdown. Security Most of the employees have started to work from home and this might pose certain challenges, specifically on the security front. There are chances of risks and the security team of an organization must identify the common risks that might arise when employees are working remotely. The security team should coordinate with the communication team and the latter must train the employees on the risks and how to manage them. This will simplify the process of security and motivate employees. Even after training employees on these, they might encounter problems with regard to security and will be in need of help. It is always advisable to answer their queries in real-time using technology or forum, such as e-mail, Skype, teams or any such platform. This will make security as approachable as possible and will enable the security team to quickly identify and respond to incidents. Social engineering The platform you are using to answer queries should have strong authentication mechanisms; otherwise cyber attackers will see this as an opportunity to socially engineer these platforms.
  • 2. Social engineering attacks are one of the greatest risks that will arise when employees work from home. The user will be prompted to make a mistake, without their knowledge and during a time like this, when you get numerous calls and emails related to the pandemic, it will be much easier to trick the user. Chances of overlooking these scams are high. The solution is to train employees on what social engineering is, how to identify it and what to do once you identify one. Even though phishing is the most common form of cyber attack, there are other modes as well and employees should be aware of these. Strong Passwords Weak passwords have always been one of the top reasons for security breaches and it makes the job of hacker pretty much easier. Below listed are four key behaviors to manage this risk;  Passphrases: Compared to passwords these are comparatively longer and ensures added security.  Unique passwords for all accounts: Do not give the same password to all the accounts; they should be unique and strong.  Password managers: This helps in storing and managing online credentials.  MFA (Multi-Factor Authentication): User is given access only after successfully entering two or more independent credentials. Updated systems The security team must see to it that the employees are using the latest version of the operating system, applications and mobile apps. Everything should be updated, as updation helps in patching security holes. Tips Here are some tips for you that can be useful while working from home;  Here are some tips for you that can be useful while working from home;
  • 3.  Change the default admin password, enable WPA2 encryption and use a strong password for your wireless network  All the devices connected to home network must be protected by a strong password and should be updated. Systems should be locked while you are not using it  Both the operating system and applications must be patched and updated  Do not discuss any confidential details with clients in public  Keep your system in a secure place and also ensure to keep your screen private. Position it away from other people  Do not access any internet sites other than the access required  Inform IT department if you come across any abnormal activity through emails or systems  If you are sharing any confidential information via emails, protect it with a password. Share the password with the user in person and not through email.  Do not use official laptop for personal use (internet or unauthorized applications or software) and avoid carrying laptop to public places to work. Above all, one should have the common sense to differentiate between genuine things and scams. It is easy to fall prey to scams, but difficult to get out of one. Get Free Consultation Working from home- How secure is it? HLB HAMT Level 18, City Tower-2, Sheikh Zayed Road PO Box 32665 Dubai – United Arab Emirates. Tel: +971 4 327 7775 E-mail: dubai@hlbhamt.com www.hlbhamt.com