-
With the widespread use of online platforms to facilitate the ease of remote work, make employees aware of the types of information that they need to safeguard and how best to do this.
-
With a proliferation of video conferencing services, such as Zoom and Microsoft Teams, make sure that employees only use secure services where the risk of hackers accessing data is reduced.
-
Always download software updates for business devices such as; tablets, phones, and PC as soon as they become available. These often contain patches for newly discovered security vulnerabilities.
-
Make sure that all business electronic devices are equipped with spyware and malware protection, including PCs, tablets and cell phones. Never use any other devices to access business profiles, internet banking or any websites where a business or personal credit card details are required.
-
Businesses should prohibit the sharing of work electronic devices. When employees use their work devices at home, no third party should be using or have access to these devices. This reduces the risk of access to protected company information.
-
Ensure that you password protect all company devices. If these are stolen or lost, it offers a level of protection against unauthorized persons gaining access to the stored information.
-
As remote working becomes necessary, employees may be tempted to connect to free WiFi networks nearby. Many of these networks are unsecured and this can lead to significant security risks. Ensure employees are informed of these risks
-
Virtual Private Networks (VPNs) assist in encrypting internet traffic, this is more often implemented when employees are connected to a public Wi-Fi network. If your company has one in place, make sure employees exclusively use the VPN when working and when accessing company information systems remotely.
“It’s a data minefield out there,” says Du Chenne.
“If businesses take their data security seriously, and empower their employees to protect all information carefully by only using approved software and tools, they should go a long way to protecting themselves against a data breach.”
Edited by Luis Monzon
Follow Luis Monzon on Twitter
Follow IT News Africa on Twitter