Cybersecurity in the times of coronavirus: Here’s how to stay safe
Cybersecurity – As more people are opting to work from home due to the coronavirus outbreak, they are also coming in the crosshairs of cyber attackers out to make a quick buck. In fact, Cybersecurity researchers are now warning that hackers may target the large workforce forced to work from home in the time of Covid-19. Experts claim to have already seen a steady spike in the number of phishing scams linked to coronavirus, targeting both consumers and industries.
The Cybersecurity and Infrastructure Security Agency (CISA), the Department of Homeland Security’s cyber agency, said malicious cyber crooks may use this opportunity to increase phishing emails targeting teleworkers to steal their usernames and passwords. Meanwhile, the National Cyber Security Centre, UK’s signals intelligence and cybersecurity agency, warned users to avoid clicking on a link to a bad website that could download malware on their PCs.
Whether you are an individual working from home or are running a small business enterprise, here is what you need to do to keep your data secure from hackers and cyber crooks.
Here’s what employers should so
Use a VPN
The best way to protect your company from cyber attacks is to use a Virtual Private Network (VPN). A VPN is a service that establishes a secure, encrypted connection between your device and a private server. Think of a VPN as an encrypted tunnel for all your internet traffic. But using a VPN has its pros and cons. A VPN promises better security, safe file transfer, remote access, and the maintenance cost is minimal. It has a few downsides, too. For instance, not all VPN services are reliable and trustworthy. You may also face speed issues while using a VPN, especially when a lot of people from the same organisation log in at the same time.
Do not share sensitive passwords
Employers are encouraged to warn their staff on the risks of sharing passwords with anyone within teams or with guests and interns. This will not only create awareness among employees but also minimise the impact of cybercrime in the workspace.
Use two-factor authentication
If possible, turn on two-factor authentication (2FA) on every social media platform, email services and even web services like AWS and WordPress. While the password has been the single factor of authentication, two-factor authentication basically adds a second level of authentication to an account log-in. Sure, it’s slightly inconvenient to enter a six-digit code, but it does have its own advantages. So make sure to enable 2FA when available.
Cybersecurity researchers are now warning that hackers may target the large workforce forced to work from home in the time of Covid-19.
Here’s what employees should so
Be aware of phishing emails
Cybercriminals inject malware onto your device when they lure users to click on a link or open an attachment. This is a common tactic to fetch sensitive information such as credit card numbers, Aadhaar number, bank account numbers, passwords, usernames, etc. But you can easily spot phishing emails. However, while working from home you also compromise enterprise security by clicking on such links.
Here are some tips to spot a phishing email:
*Check the sender’s email address and try to verify the domain.
*The email is not addressed to the sender. If the email has the sender’s name, hackers might have your name sourced from unverified data banks.
*Spot grammatical errors.
*Spot red flags before opening the email, like examine the context of the mail.
*If you keep getting the mail from the same email address, inform your colleagues, or employer.
Use more than one account. There are multiple security benefits of using more than one email account. (Image credit: Pixabay)
Use anti-virus software
Make sure your work device has antivirus software installed and fully updated. Do thorough research before buying anti-virus software. However, experts warn that anti-virus software won’t be enough to protect against ransomware. Hackers are quick to build malware and they are coming with new ways to attack devices and networks. Check if you can be secured by your company IT security software.
To prevent cyber crooks and hackers from accessing important information from your device, it is recommended to have a sound back-up plan. Store all important files in an external hard drive or save it to the cloud. The best strategy is to backup all the files regularly.
This article originally appeared on msn.com To read the full article and see the images, click here.
Nastel Technologies uses machine learning to detect anomalies, behavior and sentiment, accelerate decisions, satisfy customers, innovate continuously. To answer business-centric questions and provide actionable guidance for decision-makers, Nastel’s AutoPilot® for Analytics fuses:
- Advanced predictive anomaly detection, Bayesian Classification and other machine learning algorithms
- Raw information handling and analytics speed
- End-to-end business transaction tracking that spans technologies, tiers, and organizations
- Intuitive, easy-to-use data visualizations and dashboards
Nastel Technologies is the global leader in Integration Infrastructure Management (i2M). It helps companies achieve flawless delivery of digital services powered by integration infrastructure by delivering tools for Middleware Management, Monitoring, Tracking, and Analytics to detect anomalies, accelerate decisions, and enable customers to constantly innovate, to answer business-centric questions, and provide actionable guidance for decision-makers. It is particularly focused on IBM MQ, Apache Kafka, Solace, TIBCO EMS, ACE/IIB and also supports RabbitMQ, ActiveMQ, Blockchain, IOT, DataPower, MFT, IBM Cloud Pak for Integration and many more.
The Nastel i2M Platform provides:
- Secure self-service configuration management with auditing for governance & compliance
- Message management for Application Development, Test, & Support
- Real-time performance monitoring, alerting, and remediation
- Business transaction tracking and IT message tracing
- AIOps and APM
- Automation for CI/CD DevOps
- Analytics for root cause analysis & Management Information (MI)
- Integration with ITSM/SIEM solutions including ServiceNow, Splunk, & AppDynamics