FREE “Working remotely” online security course

FREE “Working remotely” online security course

To assist organisations to address the potential risk of staff working from home, Layer 8 Security are offering a FREE “Working remotely” online security course to anyone who wants it.

It is provided as either a SCORM format for companies to run for their staff on their own LMS or we can provide the course on our LMS for those that don’t have one.

Working Remotely

With the imminent declaration of a pandemic, many companies are suggesting that their staff work from home, hoping to reduce the risk that domestic and international travel may pose.

Interestingly enough, many people have advocated for this style of working for quite some time now, to increase the telecommuting mentality and facilitate staff to work from home. To be honest, with modern teleconferencing facilities, cloud storage, mobile devices and high-speed internet, it is an obvious way to improve the lives of staff, reduce the road traffic, reduce the parking headaches and create a happier workforce.

Unfortunately, this also presents organisations with security risks that may not have been perceived as a major concern, previously.

Risks could include:

Whilst working remotely or from home, if you want an application for something it is easy to get it from the internet. You often don’t even need to pay for it, as you can probably find a free or trial version.

If you need to quickly create and store some data, it is very easily to use the local drive, USB storage or even personal cloud storage. Staff, even though they are well meaning, may cause security incidents, without the organisation being aware of them or having any control over them, hence the name “Shadow IT”.

Even if you think your organisation has the most secure data loss prevention and device management protocols known to man, it is still easy for any person to just create confidential information somewhere else, store it locally or on the internet, outside of that circle of trusted technology.

30% of cybersecurity breaches are expected to be due to Shadow IT this year, 2020.

All organisations have information of value. Whenever a valuable information asset is placed into a technology that has not been vetted or approved, there is a risk. It might seem harmless, but it could just cause some major damage.

What Can Be Done?

Education and awareness for all employees goes a long way.

Layer 8 Security can help discover and monitor what information and services your organisations staff are actually using whilst working remotely.

To assist organisations to address the potential risk of staff working from home, Layer 8 Security are offering a FREE “Working remotely” online security course to anyone who wants it.

It is provided as either a SCORM format for companies to run for their staff on their own LMS or we can provide the course on our LMS for those that don’t have one.

This is aimed to assist companies and their staff to stay secure, even when required to work from home.

Topics

·      Correct security behaviour for remote working

·      Virtual Private Networks

·      Data storage guidelines

·      Patching

·      Passwords

·      Communications

·      Applications security (don’t download unsanctioned applications)

·      Physical security for devices

#layer8security

Web: www.layer8security.com.au

Email: [email protected]

Phone: 1300 536 706

 

要查看或添加评论,请登录

Robert de Haan的更多文章

  • Psychological and Security issues when working from home

    Psychological and Security issues when working from home

    Have you ever wondered what are the psychological risks and cyber security impacts are, that we encounter when our…

    1 条评论
  • The paradox of our time in history.

    The paradox of our time in history.

    · We have taller buildings but shorter tempers, wider Freeways, but narrower viewpoints. We spend more but have less…

  • Paying it Forward

    Paying it Forward

    In this time of life-altering change, Layer 8 Security is offering to assist any company with a complementary offer to…

    1 条评论
  • Legal Threats Make Powerful Phishing Lures

    Legal Threats Make Powerful Phishing Lures

    Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams…

  • How to quickly change security behaviour

    How to quickly change security behaviour

    Security awareness training aims not only to impart information but also to change behaviour. In order to accomplish…

    1 条评论
  • A habitually funny story.

    A habitually funny story.

    I was running a security awareness training session for some executives of one of our customers recently, when I put up…

  • Addressing Human Risk

    Addressing Human Risk

    Addressing human risk, compliance and appropriate controls isn’t as easy as just doing some email phishing, some…

  • Building a better security culture

    Building a better security culture

    Everyone knows how crucial security is and how it must be embedded into everything an organization does. A simple…

    1 条评论
  • How Can Companies Nip Employee Negligence in the Bud?

    How Can Companies Nip Employee Negligence in the Bud?

    By David Bisson and edited by Robert de Haan Employee negligence continues to be a top information security risk for…

  • Opinions on security predictive behaviour

    Opinions on security predictive behaviour

    I’m sure you heard the theme many times over the past few years that the best ROI for cybersecurity spend, comes from…

    2 条评论

社区洞察

其他会员也浏览了