Change language
Change country

How to avoid common cybersecurity threats when working from home

Protecting data while working remotely is one of the greatest challenges faced by businesses today.
girl at work

Before the coronavirus pandemic, the way we worked was already changing rapidly. Markets and consumers have demanded businesses become more mobile, more agile.

COVID-19 hasn’t just changed the rules of the game: it’s changed the game itself. Many companies, especially start-ups and tech-focused enterprises have made significant strides in the area of enterprise mobility and the concept of remote working in recent years. However, most industries, especially those considered “traditional” (banking, finance, education, manufacturing) have largely resisted a mass transition towards mobility and remote working and have found themselves flustered at a time when calm is most needed.

Many of these companies were simply not prepared for the sudden need for flexibility and agility imposed upon our society as the virus swept across national and domestic borders. They have been forced into hastily devising a remote working strategy, something which should have been blended into the company’s culture over time.

Employees have been given their laptops or computers to take home and the security of a company’s data and information goes from being protected in one secure place to an arena where the risks are multiplied dramatically. This panic is music to hackers’ ears.

Cybersecurity at home

Hackers know only too well that they only need to find one weak link in the security chain in order to do untold damage. Therefore, the responsibility for ensuring the safety of an organization’s data is transferred to each individual employee working from home.

Here we examine the main threats facing remote workers and how they can be tackled:

Securing the foundations: Internet connection points in the home are a key concern when it comes to security when working from home. Therefore, a router security check is necessary especially if on the bottom of the router it says Wired Equivalent Privacy (WEP) connection. The user should contact their technical department or their internet service provider to request a change to Wi-Fi Protected Access (WPA) and assistance in changing the password, if the user is unable to do so alone. In both cases, it is also possible to request a change of password and for the name of the Wi-Fi network to be invisible to others, meaning only those who know the name chosen by the remote worker can connect to it.

Phishing: Imperva define phishing as “a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.” In Verizon’s 2019 Data Breach Investigations Report, they concluded that 32% of data breaches involved phishing. Very often, phishing emails are fairly obvious. Welivesecurity describe how, “They may also have an impersonal greeting – think of those ‘Dear Customer’ or ‘Dear Sir/Madam’ salutations – or feature implausible and generally surprising content.”

They advise users to never click on links in an email to a website unless absolutely sure that it is authentic. If there is any doubt, users should open a new browser window and type the URL into the address bar.

Anti-virus: Along with securing your internet connection, ensuring your antivirus protection is up to date is one of the first security measures to tick off the list. Norton Security detail how “Not every type of cyberattack can be prevented with antivirus software, but it can be a great asset when trying to prevent intrusion into a computer.” They explain how not all attacks lead to the loss of valuable information, but intrusions exploit what they call “vulnerabilities” and that, “Once even the most innocuous of an intrusion exploits a vulnerability, it basically sends a signal to others that this computer has been infiltrated. This opens the door wide open to much worse attacks.”

Third-party threats: Many of those who work from home share living spaces with family or friends and, as often is the way, visitors call over. This shouldn’t make us paranoid, but it should reaffirm the importance of good habits: locking your computer when you are away, safely storing important documents as well as regularly changing passwords.

Internet browsing: When online it’s essential to use a secure website (indicated by https:// and a security “lock” icon in the browser’s address bar) to browse, especially when handling sensitive data. You should never use public, unsecured Wi-Fi when working remotely. When in doubt, use your mobile’s internet connection.

Securing the future of remote working argues there are two types of companies: “those that have discovered security breaches and those that don't yet know they've been breached.”

Data breaches are a fact of everyday life, but that doesn’t mean we should just accept it. The ability to manage the transition to a more mobile way of working while ensuring maximum data security will determine the winners of the digital age in business. Those who proceed with a growth-first, security-second mindset will eventually sink.

According to a study by Gemalto, 66% of consumers surveyed said they wouldn’t do business with a company that had had sensitive information exposed due to a data breach. Therefore, finding the sweet spot between maximum mobility and maximum security is one of the great challenges facing today’s companies who find themselves in uncharted waters.

Businesses need to create a sustainable approach that meets the need to be more agile and flexible without jeopardizing security. Without this, remote working will continue to be viewed by many as an emergency measure, rather than part of the organization’s DNA.

Here's what to consider when working remotely

Cyber-risks, communication, confidentiality and more...check out these helpful resources for remote working tips and tricks.

  • Technology for remote communication

    How technology can help you communicate effectively with your organization while working remotely

  • The importance of your at-home workspace

    How setting up a workspace can help your mental health when working remotely.

  • Four tools required for remote project management

    Making sure to implement these tools so your employees can work remotely effectively and efficiently.

We're here to help you drive success in your business.

Get in touch with a Kyocera expert today so start transforming the way you work.

Cookies and your privacy

We use: Essential cookies to maintain the proper functioning of our website; Statistical cookies to collect information about how you use our site, such as which pages you visit and which links you click on, to analyze visitor interactions with our website and generate aggregate, anonymized reporting to understand and improve our website; and Marketing cookies to tailor advertising to fit your demonstrated interests. Please use the 'Cookie Preferences' button to select your preference. Select 'Accept All' to experience our website with the functionality of all cookies or select "Essential Only" to limit functionality to maintaining the proper functioning of our website.

Cookie Preferences

Field is required

We use cookies to make sure that our website is working properly or, occasionally, to provide a service on your request (such as managing your cookie preferences). These cookies are always active unless you set your browser to block them, which may prevent some parts of the website from working as expected.

Field is required

These cookies allow us to measure and improve the performance of our website.

Field is required

These cookies are only placed in case you give your consent. We use Marketing cookies to follow how you click and visit our websites in order to show you content based on your interests and to show you personalised advertisement. Currently you do not accept these cookies. Please check this box if you would like to.