小程序
传感搜
传感圈

How Do You Manage Cybersecurity With Employees Across the Globe? Here's Your Answer.

2022-08-08
关注

Cybersecurity is a $60 billion industry, and it continues to grow year over year. Most companies are careful to take extreme precautions to keep their sensitive data, and that of their employees, protected. But when you combine the rise of remote work over the last decade with a global pandemic, it throws a real monkey wrench into an otherwise well-oiled machine.

According to Statista, data breaches within the U.S. (where they also happen to be the most frequent and most expensive) cost an average of $8.6 million — enough to bring your business to a screeching halt. So, how do you keep your proprietary and private information safe? We'll find out, but first, why are remote companies much more susceptible to cybersecurity threats and breaches?

  • Unsecured Wi-Fi. When remote employees work from anywhere, they really do work from anywhere. That might mean a coworking space with secure Wi-Fi, but it might also mean a coffee shop, an airport or the gym. Whenever your company's data is accessed over one of these networks, it's at risk.
  • Personal hardware. It's possible you've provided your employees with company-owned laptops and secure server access, but it's equally as likely that they're doing at least some (if not all) of their work from their personal devices. This also means that a personal laptop, which is far more likely to be left unlocked and in the open, can be compromised.
  • Inadequate training. If your remote employees haven't gone through cybersecurity training, add it to your to-do list, stat. Go over VPNs, authorized use of personal devices, password management and data encryption.

According to Business Tech Weekly, 81% of CIOs said their company had fallen victim to a Wi-Fi-related security breach in the last year (with 62% of them originating in cafes or coffee shops). So how do you keep your remote team from becoming a statistic?

Related: Protect Your Business by Becoming a Cybersecurity Analyst

Create a cybersecurity response plan

One weak password could be all that's standing between your remote company and a serious cyber breach. That's why it's critical to have a cybersecurity response plan in place. Your plan should cover, at minimum, all the basic information from your cybersecurity training, plus how to identify scams and phishing attempts, and what employees should do if and when a breach is suspected.

Be sure your action plan is comprehensive, is shared across the organization and is quickly accessible when needed. Institute a cybersecurity "chain of command" so employees know where to turn if they believe they're involved in a cybersecurity incident.

Adopt a password management system

What do your anniversary, your mother's maiden name and your kids' birthdays all have in common? They're all terrible passwords. And yet, they're some of the most commonly used. Instead of leaving it up to employees, implement a password management system that will ensure your team has access to the software, tools and resources they need while keeping your information protected. In addition to a password management system, remind your employees when choosing passwords to:

  • Use the system's recommended password or choose a password that is unique and doesn't include known personal information
  • Avoid using the same password across multiple platforms
  • Change passwords on a regular basis

Related: How to Keep Your Company Safe From Cyber Attacks

Use multi-factor authentication

Multi-factor authentication (MFA) requires verification from your employees to access sensitive or restricted information. Essentially, they must provide proof that they are who they say they are. Types of MFA include:

  • PINs or verification codes (often sent via SMS)
  • Security questions
  • Real-time access requests (an authorized user approves access when requested)
  • Biometrics, including fingerprints, retinal or face scans
  • Hardware like key fobs or badges that must be scanned before accessing protected information

MFA is evolving rapidly and breaking into new technologies, so make sure you work with a trusted professional to choose the types of multi-factor authentication for your remote team.

Make common sense a little more common

Hiring a cybersecurity pro can get pricey (though it's a worthwhile investment), but there are small steps every remote employee can and should be taking, especially if you need to ensure your data is protected while you put a cybersecurity plan in place. Starting now, make sure every remote employee takes the following actions:

  • Ensure personal laptops are password-protected and never left unattended and unlocked
  • Turn on your firewall
  • Enable encrypted backups
  • Use a secure internet connection when working in a public place, or if that isn't possible, use a VPN

Whether you're new to managing a remote team or an old pro, the need for increased cybersecurity is constantly growing. And when your employees are working from home, working while traveling or working from far-flung locations, it's easy for a small chink in the armor to result in a fatal blow. Keep the above tips in mind when creating your cybersecurity response plan and ensure your employees — and your company's most sensitive information — are constantly protected.

参考译文
你如何与全球员工一起管理网络安全?这是你的答案。
网络安全是一个价值600亿美元的行业,而且还在逐年增长。大多数公司都小心翼翼地采取极端的预防措施来保护自己和员工的敏感数据。但是,当你把过去十年远程工作的兴起与一场全球流行病结合在一起时,它就会真正打乱原本运转良好的机器。根据Statista的数据统计,美国境内的数据泄露事件(也是最频繁和最昂贵的)平均损失为860万美元——足以让你的业务陷入急刹车。那么,如何保证你的私有信息和私人信息的安全呢?我们会找到答案的,但首先,为什么远程公司更容易受到网络安全威胁和入侵?无担保的wi - fi。当远程员工在任何地方工作时,他们真的是在任何地方工作。这可能意味着一个有安全Wi-Fi的联合办公空间,但也可能意味着咖啡店、机场或健身房。每当你的公司数据通过这些网络之一访问时,它就处于危险之中。个人硬件。有可能你已经为你的员工提供了公司拥有的笔记本电脑和安全的服务器访问,但同样有可能他们正在通过他们的个人设备做至少一部分(如果不是全部)工作。这也意味着个人笔记本电脑可能会受到威胁,因为它更有可能不加锁、处于公开状态。培训不足。如果你的远程员工没有接受过网络安全培训,那就把它加到你的待办事项列表中。检查vpn、个人设备的授权使用、密码管理和数据加密。据《商业科技周刊》(Business Tech Weekly)报道,81%的首席信息官表示,他们的公司在去年成为了与wi - fi相关的安全漏洞的受害者(其中62%的漏洞源自咖啡馆或咖啡店)。那么,如何避免远程团队成为统计数据呢?相关:通过成为网络安全分析工具来保护您的业务,薄弱密码可能是您的远程公司和严重的网络漏洞之间的所有。这就是为什么有一个网络安全响应计划是至关重要的。你的计划至少应该包括来自网络安全培训的所有基本信息,以及如何识别骗局和网络钓鱼企图,以及当怀疑出现漏洞时员工应该做什么。确保您的行动计划是全面的,在整个组织中共享,并在需要时能够快速访问。建立一个网络安全指挥链;因此,如果员工认为自己卷入了网络安全事件,他们知道该去哪里求助。你的结婚纪念日是什么?你母亲娘家姓什么?你的孩子姓什么?生日都是相同的吗?它们都是可怕的密码。然而,他们是最常用的一些。与其让员工自行决定,不如建立一个密码管理系统,确保你的团队能够使用他们需要的软件、工具和资源,同时保护你的信息。除密码管理系统外,在选择密码时还应提醒员工:相关:如何保护公司免受网络攻击多因素身份验证(MFA)要求员工进行验证,才能访问敏感或受限信息。从本质上说,他们必须提供证据,证明自己就是他们所说的那个人。MFA的类型包括:pin或验证码(通常通过短信发送)安全问题实时访问请求(授权用户在请求时批准访问)生物识别,包括指纹,视网膜或人脸扫描硬件,如关键fobs或徽章,在访问受保护的信息前必须进行扫描MFA正在迅速发展和突破新技术,所以确保您与可信的专业人员合作,为您的远程团队选择多因素认证类型。 聘请网络安全专家的费用可能会很高(虽然这是一项值得投资的投资),但每个远程员工都可以而且应该采取一些小步骤,尤其是在你需要确保自己的数据受到保护的同时,你要制定一个网络安全计划。从现在开始,确保每个远程员工采取以下行动:无论你是管理远程团队的新手还是老手,对网络安全的需求正在不断增长。当你的员工在家工作、在旅行中工作或在遥远的地方工作时,盔甲上的一个小裂缝很容易导致致命的打击。在制定网络安全响应计划时,请牢记上述提示,并确保您的员工——以及您公司的最敏感信息——不断受到保护。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘