Home Features Remote Workforce: Five Best Practices for Organisations to Ensure Cybersecurity

Remote Workforce: Five Best Practices for Organisations to Ensure Cybersecurity

75% Of Security Pros Say Remote Work Led to Changes in Financial Services Cyber Programs: Survey

In the last couple of weeks, the world has changed in unprecedented ways. Owing to the Coronavirus pandemic, companies across the country have resorted to remote working while advocating work from home policies to ensure business continuity. In the process, organizations have been rushing to embrace technology to allow collaboration and ensure productivity with various tools for video conferencing, chat applications, tech support and so on. Clearly, we are in living in a hyper-connected world.

By Mary Jo Schrade, Assistant General Counsel, Regional Lead, Microsoft Digital Crimes Unit Asia

The main focus of employees now is managing their tasks and responsibilities – both at home and at their remote workplace; and while technology has enabled much of it, the current scenario may lead to a wavering attention towards ensuring cybersecurity, greatly affecting each organization’s security profile. In this scenario, CISOs and admins must urgently look at new scenarios and models to address new threat vectors, as their places of work transform into distributed organizations overnight.

Here are five best practices for organizations and employees to follow:

  • Team up and manage logins: Employees are chatting and sharing more than usual during this time, even if there isn’t an official tool provided by IT. That’s why we recommend all employers take advantage of the six months of free premium Microsoft Teams which now has no limit on how many users can join or schedule video calls using the “freemium” version. That way, employees know which channels to use, and CISOs can better manage them securely.
  • Sensitize employees about Phishing attempts: Remote workers have access to propriety data and information and your network. Warn employees to expect more phishing attempts, including targeted spear phishing aimed at high profile credentials. Be clear on what official communications about business continuity and health and safety should look like, and from where they should originate. Have employees watch out for urgent requests that violate company policy, use emotive language and have details that are slightly wrong—and provide guidance on where to report those suspicious messages.
  • Establish a clear communications policy: Establishing a clear communications policy helps employees recognize official messages. For example, video is harder to spoof than email: using an official channel like Microsoft Stream can ensure employees are able to distinguish legitimate communications from phishing, while helping people to feel more connected; and on-demand streaming also helps employees juggling personal responsibilities, like school closures or travel schedule changes.
  • Warn about suspicious links: 91% of cyberattacks start with an email, which either leads to malicious links directly or which contains dangerous attachments. Warn employees not to click on links if they suspect an email to be a scam. One method of testing the legitimacy of a link is to rest your mouse—but not click—over the link to see if the address matches what was typed in the message. Note that the string of IP address numbers looks nothing like the company’s web address.
  • Suspicious attachments: Likewise, do not open attachments in emails that are from strangers, or an email from someone you do know but with an attachment you weren’t expecting, it may be a phishing attempt, so we recommend you do not open any attachments until you have verified their authenticity. Attackers use multiple techniques to try and trick recipients into trusting that an attached file is legitimate.

It is estimated that since the pandemic began, hackers have ramped up phishing and ransomware attacks fivefold. It is more crucial now, than ever for every employee of an organization to uphold the best practices of cybersecurity.

About the Author

Mary Jo Schrade is responsible for supervising the initiatives, programs and strategies related to preventing and disrupting organized cybercrime, piracy and online tech support scams through public-private partnerships, coordinating enforcement, and engaging in public speaking relating to cyber security and Microsoft’s digital trust commitments to our customers.

Disclaimer: CISO MAG does not endorse any of the claims made by the writer. The facts, opinions, and language in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same. Views expressed in this article are personal.