The business leader’s guide to workplace cybersecurity
Bruce Hill
Business Performance Advisor helping CEOs & Business Owners with Human Capital, HR, Benefits and Compliance.
As cybercriminals advance in sophistication, the looming threat of cyberattacks poses a significant risk to businesses. And with a surge in remote and hybrid work setups, the vulnerabilities increase, making it imperative for employers to bolster their cybersecurity defenses.
Employers need to:
It doesn’t matter whether your company is large, midsize or small, and public or private sector – cybercriminals don’t discriminate. In fact, smaller businesses are attractive to bad actors because they typically have lower IT budgets and weaker cybersecurity measures in place.
In this blog, we explore 12 crucial cybersecurity practices to shield your business, ranging from securing remote workspaces and establishing secure connections to thwarting phishing scams and leveraging IT expertise.
What are the consequences of poor cybersecurity?
The impact of cyberattacks on businesses can be widespread and devastating:
12 cybersecurity practices to have in place now
1. Provide and use only company-issued devices and applications for work
It’s extremely risky to allow employees to use their own devices or unapproved applications when working remotely.
You may not know anything about – nor do you have any control over – the configuration of those operating systems, firewalls, antivirus protection, software updates or authentication requirements.
It can be a risky proposition to allow personal devices to access your company network and resources. Do you want to put sensitive company data at risk of exposure if that device or application is compromised?
If your employees are going to work remotely, a better scenario is to provide them with a company-issued device that’s outfitted with all the necessary protections and vetted to company standards. However, if your organization is unable to deploy company assets, your IT team should consider how they will evaluate personal devices before they can connect to your company network and resources.
2. Physically secure workspaces outside of the office
When employees work outside the office, it’s often at home or in a public space, such as a coffee shop, library, airport or hotel. Just because these tend to be relaxed, casual environments doesn’t mean that employees can let down their guard and become lax about security. This makes them perceived as easy to exploit and therefore especially vulnerable to cyberattacks.
Tips to secure devices outside office workspaces
3. Establish a secure connection to company systems
To prevent outside parties from eavesdropping on their activity or stealing company data, your employees should use a secure, private Wi-Fi connection when working outside the office.
What does this mean?
The Wi-Fi network should be password protected and the provider of the Wi-Fi should be known. Connecting to “Free Public Wi-Fi” is never a good idea.
Best practices around Wi-Fi connection
Additionally, a crucial extra layer of cybersecurity is to use a virtual private network (VPN). A VPN provides a secure connection between your device and your company network. All data transferred between these points is encrypted. The encryption provided by the VPN ensures that criminals can’t eavesdrop on authentication or the data being transferred between your device and your company resources.
An extra benefit of a VPN is the continuity of operations. When employees log into the VPN remotely, if configured correctly, they can access information and perform functions as they normally would in the office but from any location.
4. Ensure cybersecurity in operating systems and software
Because the nature of cyberattacks is always shifting, operating systems and software become exposed to vulnerabilities as flaws are discovered by hackers. Updates, or patches, are designed to fix those vulnerabilities.
Organizations should keep company devices up to date on patches. To access company systems, devices should run a scan to check that all software is updated. This prevents high-risk devices from connecting to company systems.
When it’s time to update your operating system or software, make sure employees download legitimate, approved patches. To remove any ambiguity, you or your IT department should send a direct link to download the patch.
Under no circumstances should employees scour the internet to identify software. Unapproved software or applications may contain viruses or other malicious code.
Best practices around antivirus software
5.?Don’t permit users to have administrative privileges
Administrative rights need to be controlled, especially in the realm of cyber security.
Users of company-issued devices – your employees – shouldn’t enjoy administrative privileges on those same devices. In other words, they shouldn’t be able to download software or otherwise alter the operating system without the approval of you or your IT department. Otherwise, your systems and devices could be vulnerable to viruses.
Instead, all software updates should be initiated on your end. This helps ensure that company-issued devices operate in an approved fashion.
6.?Avoid easily compromised passwords
Some best practices around passwords
7.?Set up user authentication for company devices and networks
What is user authentication in the context of cybersecurity?
It’s proving to a system that whoever is trying to log in is who they say they are. It requires system users to provide more information beyond a password to verify their identity.
领英推荐
Strong authentication should always be required to log in to company devices and access company networks.
Whenever possible, deploy multifactor authentication – two or more verification steps – for an added layer of security during login. Multifactor authentication is commonly referred to as:
Note: SMS is falling out of favor as a verification method because of increased SIM card attacks. Now, the most popular verification method is a software authenticator, such as Google Authenticator.
Without multifactor authentication, users who have been phished may allow cybercriminals to access your company systems.
8. Beware of phishing scams
A phishing attack is when a bad actor disguises as a legitimate source to obtain sensitive data from your company and employees or infect your devices and systems with malware.
With the rise of artificial intelligence (AI) , these attacks have become increasingly sophisticated and harder to detect as obvious scams.
The latest trends?
Tips to help your employees avoid phishing scams
FAKE WEBSITES
FRAUDULENT PHONE CALLS
It’s important that you test how employees respond to phishing attempts in the real world. That’s why your IT department should try to phish your employees at regular intervals. Employees who fail the test must undergo anti-phishing training.
9.?Stop outsiders from crashing videoconferences
Cybercriminal hacking into conferences has become a major problem. Unwanted attendees often interrupt videoconferences for harmless, albeit annoying disruption, but occasionally it’s to eavesdrop and steal information.
How to stop videoconference intruders
Additionally, avoid downloading unapproved videoconferencing applications, which could be infected with viruses.
10. Have a disaster-recovery plan
When employees work remotely, you just don’t have the same level of control over the security of your devices as you do when they work in the office.
What will you do if one of these scenarios impacts your devices?
When any of these events happen, valuable company data can be exposed to outside parties or is lost. This is known as a?technology disaster.
Some practices to include in a disaster-recovery plan
11.?Establish cybersecurity remote work and data-protection policies
These policies are important and offer valuable guidance to your employees. Clearly written security policies can reduce the risk and uncertainty during an emergency event.
The cybersecurity issues and prevention tips addressed in this blog could be formalized in a written remote-work policy and?data-protection policy . Both should be documented in your?employee handbook.
12.? Leverage IT expertise
Your company’s sensitive data and the integrity of your company’s IT infrastructure are at stake.
This is a highly technical, complex area that calls for the involvement of experts. And it’s a full-time job on its own to keep up with the latest cyberattack techniques and stay on top of cybercriminals’ efforts to infiltrate your company.
If you don’t have qualified in-house IT expertise and resources continually managing this for you, you should strongly consider hiring an IT consultant to:
If your cybersecurity strategy is left to an unskilled resource, you will find that you have a poorly defended infrastructure.
Summing it all up
No business is immune from cyberattacks. The fact is, it’s an escalating threat that will only continue to grow and impact all employees. However, many companies have remote employees, which can exacerbate their cybersecurity risks. Follow the 12 steps outlined here to implement cybersecurity best practices and avoid the many harmful consequences of a successful attack.
Want to learn even more about technology and how to make your business operate smarter? Download our free e-book: HR technology: How to choose the best platform for your business .