Securing sensitive company data in a WFH environment

WFH Security issues: Don't leave your business vulnerable

The issue of data security has always been at the forefront of an IT manager’s mind, and now that the boundaries between the work and home environment are getting blurrier by the day, the methods with which to successfully manage this risk can often seem like a moving target.

Prevention is Better Than Cure

Yet just as cyber criminals have refined their tactics over the past year, the developments in IT security have quickly stepped up to plug the new vulnerabilities.

The best approach though – as is often the case – is to prevent the attacks from happening in the first place.

A recent study by Verizon revealed that 45% of data breaches occur due to criminal hacking, with the most common technique being to steal the users’ credentials.

With many employees reverting to personal emails and computers to carry out workplace tasks, it is clear why this kind of security breach is on the rise.

Social Engineering

Phishing attacks are the most common method of acquiring personal details and anyone from the new intern to the CEO can fall prey to it.

Long gone are the days of badly worded emails from dubious addresses, phishing scams have evolved to include smishing (text message scams), vishing (fraudulent phone calls) and a whole host of other social engineering schemes that are far more complex.

It is all too easy to inadvertently open a link or respond to a message that can compromise data.

Vigilance Pays Off

Being extra vigilant can certainly mitigate this risk but human error is the second most common cause of data breaches (Verizon claims 22%) so it is always best to rely on systems like multi-factor authentication (MFA) and blocking legacy authentication to secure workplace information.

Microsoft claims that 99% of these attacks can be thwarted in this way and setting up remote access procedures via Windows Virtual Desktop is another highly recommended practice.

It is always wise to remain cautiously sceptical of any external interactions, especially if a request seems out of the ordinary. Using more than one method of interaction when working remotely can also help thwart attackers.

Small Changes Can Make A Big Difference

Requiring employees to adopt these practices ensures that sensitive data is kept off of personal devices and the IT manager can keep a far tighter control on data usage and access.

Most of these apps are offered as part of a variety of Microsoft packages – such as Microsoft 365 Business Premium – and our expert team of IT specialists are always on hand to ensure that they are set up in the most efficient and cost-effective way for even the most diverse business.

For more information click here.