{"id":188,"date":"2020-04-09T11:30:42","date_gmt":"2020-04-09T11:30:42","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=188"},"modified":"2021-09-10T06:46:37","modified_gmt":"2021-09-10T06:46:37","slug":"cybersecurity-tips-in-the-time-of-covid-19","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/","title":{"rendered":"Cybersecurity Tips in the Time of Covid-19"},"content":{"rendered":"<h2 style=\"text-align: center;\">How to Work from Home Securely<\/h2>\n<h3 style=\"text-align: center;\">6 Cybersecurity Tips in the Times of Covid-19<\/h3>\n<p><span style=\"font-weight: 400;\">When Covid-19 (Coronavirus) began to spread rapidly in China and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now workers all around the world who haven\u2019t had experience working remotely before are getting to grips with this new way of working.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This rapid expansion of remote working has presented challenges for employers, employees and IT staff alike &#8211; especially when it comes to cybersecurity. The usual approach of getting a worker to come in to collect their new laptop and phone, and to receive the on-site training that you hope will make them a safer teleworker is not an option for many. Remote users will often need to be set up from scratch and entirely remotely.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Below are 5 tips on how to work from home safely.\u00a0<\/span><\/p>\n<p><strong>1. Ongoing Communication<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Employers should provide clear information for staff and have open channels for feedback to staff on how to react to a problem. That means info on who to call, hours of service and emergency procedures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For employees, it\u2019s smart to stay on top of company communications. Your inbox might contain emails about policy changes ranging from work hours to travel. Your employer might consolidate Covid-19 information on the company intranet. If you have any questions, ask.<\/span><\/p>\n<p><b>2. Using Organization\u2019s Tech Tools<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Employer\u2019s cybersecurity tools are designed to protect data and devices. Cybercriminals have an interest in both, whether you\u2019re working in the office or at home. That might mean you do your work on company supplied laptops and mobile devices if this is possible. In using either your organization\u2019s computer or your own, you most likely will also use a firewall and antivirus protection, along with security features like VPN and 2-factor authentication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Avoid improvising with tools that haven\u2019t been approved as tempting as it may be. You could inadvertently introduce a software program with a security flaw \u2014 and that means someone unauthorized may be able to access company data or any personal data you have on that device. Discuss with your needs with your\u00a0 IT team who can help with a solution.\u00a0<\/span><\/p>\n<p><b>3. Beware of coronavirus-themed phishing emails<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There have been many reports of cybercriminals exploiting Covid-19 by sending fake emails with dangerous links to employees. Remote workers should be suspicious of any emails asking them to check or renew their passwords and login credentials or click on an embedded link, even if they seem to come from a trusted source. Don\u2019t click. Instead, immediately report the phishing attempt to your employer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employers should ensure users only to reach out to you for cybersecurity assistance by using the email address or phone number you gave them. Provide a single contact for these incidences.<\/span><\/p>\n<p><b>4. Back-Up, Back-Up, Back-Up<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Create a back-up strategy and implement it. All important files should be backed up regularly. Not backing up data is a risky move, which means any files that are deleted or corrupted by an attack cannot be restored.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The WannaCry ransomware attack spread to 150 countries, impacting over 10,000 organizations and 200,000 individuals in over 150 countries. The outcome of this event highlighted the value of having good clean backups in a secure storage system in order to recover data hidden from ransomware. These attacks also demonstrate the value of having the latest security patches installed and a comprehensive security software solution protecting your workstations, laptops and servers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While more businesses are now implementing backup solutions, there is a tendency to \u2018setup and forget\u2019, so they don\u2019t realize something has failed with the system until it\u2019s too late. It is recommended that organizations perform daily offsite backups of their systems, as well as periodically validate the quality of the backups. There is nothing worse than having your systems compromised and then realizing your backups are effectively useless.<\/span><\/p>\n<p><b>5. Other Useful Tips<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Tips for home working for employees also include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure your Wi-Fi connection is secure. While most Wi-Fi is correctly secured, some older installations might not be, which means people in the near vicinity can snoop on your traffic.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure anti-virus is in place and fully updated.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Check all security software is up to date: Privacy tools, add-ons for browsers and other patches need to be checked regularly.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Lock your screen if you work in a shared space: Workers should really avoid co-working or shared spaces at this moment and that social distancing is extremely important to slow down the spread of the virus.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure you are using a secure connection to your work environment.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Check if you have encryption tools installed.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><b>6. Monitoring Remote Sessions<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v5 will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.tsfactory.com\/forums\/news\/2020\/03\/20\/recordts-v5-released-this-month\/\">Click here<\/a> to learn more about secure remote session recording.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Work from Home Securely 6 Cybersecurity Tips in the Times of Covid-19 When Covid-19 (Coronavirus) began to spread rapidly in China and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now workers all around the world who haven\u2019t had experience working remotely before are getting to grips [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":189,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[15],"class_list":["post-188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-remote-working"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Tips in the Time of Covid-19 - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Tips in the Time of Covid-19 - Blogs\" \/>\n<meta property=\"og:description\" content=\"How to Work from Home Securely 6 Cybersecurity Tips in the Times of Covid-19 When Covid-19 (Coronavirus) began to spread rapidly in China and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now workers all around the world who haven\u2019t had experience working remotely before are getting to grips [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-09T11:30:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T06:46:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/\",\"name\":\"Cybersecurity Tips in the Time of Covid-19 - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg\",\"datePublished\":\"2020-04-09T11:30:42+00:00\",\"dateModified\":\"2021-09-10T06:46:37+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg\",\"width\":500,\"height\":333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips in the Time of Covid-19\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Tips in the Time of Covid-19 - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Tips in the Time of Covid-19 - Blogs","og_description":"How to Work from Home Securely 6 Cybersecurity Tips in the Times of Covid-19 When Covid-19 (Coronavirus) began to spread rapidly in China and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now workers all around the world who haven\u2019t had experience working remotely before are getting to grips [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-04-09T11:30:42+00:00","article_modified_time":"2021-09-10T06:46:37+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/","name":"Cybersecurity Tips in the Time of Covid-19 - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg","datePublished":"2020-04-09T11:30:42+00:00","dateModified":"2021-09-10T06:46:37+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/coronavirus-statistics-on-screen-3970330-e1631256389822.jpg","width":500,"height":333},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-tips-in-the-time-of-covid-19\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips in the Time of Covid-19"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":4,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":445,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/188\/revisions\/445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/189"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}