Categories
News

Cybersecurity Staff Cuts Cybercrime Stats in Half in 2020

With more people working from home every day, you would think the number of cyberattacks would be rising exponentially. Surprisingly, cybersecurity threats are actually on the downturn, which shocked the cybersecurity industry, which predicted that the working from home boon would introduce the greatest opportunity for cybersecurity breaches, releasing a hacker’s paradise.

Cybersecurity concerns were not unfounded as cyberattacks did happen as phishing and data mining did compromise identities, bank accounts, passwords, but all in all, while cyberattacks increased, resulting cybercrime was reduced by half of what it was prior to the pandemic work-from-home explosion.

If that doesn’t make you scratch your cybersecurity noggin, I don’t know what does. It doesn’t seem to make sense. Right?

The fear of increased attacks has many cybersecurity specialists on high-alert. They knew in advance that this shift from the office to the home was going to be a challenge, so they prepared for the ensuing attacks. And when the attacks came in, they were waiting and ready to respond to any potential data breaches of security.

Cybersecurity is a team effort. It takes IT staff working a hand in hand with open lines of communication, sharing any irregularities noticed, even if it may seem to be an innocuous report at the time, and entire teams, down to line staff, also keeping an eye on activity and reporting anything suspicious.

When executive orders were issued to cell-in workers, allowing them to work while imprisoned in their homes, there was a mad shuffling of IT and networking staff, manning up to answer the call, with a massive proclamation, “Not on my watch!” They had to move and take action quickly, most only had a few days to put all their telecommuting security affairs in order.

No doubt, the cybercriminals were waiting with bated breath for this opportunity to attack an unsuspecting population that would be forced to telecommute, and not having any time to prepare was a vulnerability they couldn’t have imagined would be handed to them on a silver platter.

No one was prepared for the necessary emergent response, which required line staff to have virtual private networks (VPNs) ready to connect to systems remotely. This was the single largest drain on OT staff tasked with responding rapidly to the shift.

Not to forget, the cybersecurity staff was also ordered to work from home. Imagine, having to secure the entire network from your living room, kitchen, or bedroom. Yet, that is what is happening. They are in the same boat, working from home and making sure all is secure, while they are conducting regular training for line staff to learn more about what they can do on their end to help prevent cyberattacks while working remotely.

What could have been an embarrassing collapse of security around America, ended up being an impressive display of how a well prepared IT staff can respond to emergent needs in a heartbeat, to the surprise of hackers and cybercriminals (and maybe the IT staff, as well).

Statistics verify security response and efficacy by a 50% significant drop in cybercrime.

Good job, guys!

Categories
News

Telecommuting Security Working from Home Remotely

If you are already telecommuting, you probably already have your security affairs in order for this is a prerequisite for working remotely for any discriminating employer. It is important for the responsible telecommuter to have the basic security measures instilled as the standard operating procedure if you intend to work remotely for someone else (plus they are good measures to have in place for your own safety and security in an uncertain world). These methods protect both you and your employer.

Secure Your Wi-Fi

Starting at the beginning, since you will be using your wireless router at home to access the Internet and conduct business on the behalf of you employer, make sure to change your home Wi-Fi router’s password to something unique, and not your Internet provider’s default password.

Raise Your Wireless Security Awareness

If you are accessing wireless networks while in transit or at different locations, avoid connecting to public networks, especially when working. You don’t want to be the weak link in your employer’s system, and there are many cybersecurity threats and criminals out there scanning for vulnerable remote workers, don’t be one of them.

If you must access an open network be extremely cautious. Only log-in to secure sites (HTTPS) and heed warnings of outdated, untrusted, or self-signed security certificates. An antivirus program is essential, and it is a good idea to have a VPN onboard, even if your employer does not require a VPN.

Unique Passwords

This may feel uncomfortable, especially if you have been using a limited number of passwords that you can remember to log-in to things. In a secure work from home scenario, every device, every program, service, and web site should have its own unique password. Preferably one you cannot remember off the top of your head. And (here it comes) you need to change them periodically to keep them fresh.

If this sounds overwhelming, you can use a password manager, which is a security tool that keeps track of all your passwords so that you don’t have to remember them. You will need to remember only one password, the one to access your password manager, then you let it do all the heavy lifting by securely logging you in.

Data Security Mindset

Be extremely mindful and guard private and proprietary information with integrity, which means not to disclose any confidential or personal information over the phone or in emails. Cybercriminals are quite adept at impersonating management, staff, friends, or coworkers to compromise your data.

If something doesn’t sound right or seems like it might potentially lead to compromise, call up your security team or project manager, and report the incident or suspicious activity. It does not reflect upon you poorly to err on the side of caution.

Software Updates

Do not put off security updates on your devices or software. These updates help keep you and your information protected. New patches and updates are released whenever any potential for breach is discovered by the provider.

Plus, the updates keep the software working effectively when exchanging and interacting with other users and coworkers who are using the same software. It is helpful to rely on everyone using the same versions of the product.

Verified Software Tools

If you are used to finding free software to help you to accomplish a task quickly, do not use the computer you work with to do so, and you would be best advised to stop doing so altogether. Unfortunately, free software is a breeding ground for malicious software.

Try to stick to software solutions that are registered and approved by your security team, management, or other team members. Again, keeping everyone on the same page, whenever possible, for consistency and security.