01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Risks of Working from Home<br />

COVID-19 has forced the corporate industry to opt for remote working in place of an office setting. This<br />

has increased the risk of a data breach. The major causes of this increase in risk are:<br />

● Work from home means that several devices are connected to the company's database. This<br />

increases the chances of data theft and leakage.<br />

● The flow of data to and fro the company's system is carried out through multiple networks with<br />

varying security levels. This eases the work of predators and cybercriminals.<br />

● Most of the employees working in a traditional setting are not familiar with the usage of online<br />

tools. This increases the chances of human error and mishandling of data.<br />

● Unprotected devices are always an easy target for phishing emails and malware. Just one risky<br />

device or a single random click by any employee can risk the whole system.<br />

Checklist for GDPR Compliance<br />

Here are some necessary measures that your company or organization must take, especially in this<br />

current situation of remote working, to maintain their compliance with GDPR.<br />

● The company must update its privacy policy for employees working from home.<br />

● New agreements must be made with third parties and outside vendors to maintain compliance<br />

with GDPR.<br />

● All the employees should be provided with secured devices by the company.<br />

● If employees are using their own devices, they must be well protected with an up to date version<br />

of antimalware and firewall.<br />

● The encrypted network is a must for data security. Therefore, the company should provide VPN<br />

protected Wi-Fi devices to all the employees working from home.<br />

● If the employees are using their own Wi-Fi, they must be restricted to use password-protected<br />

Wi-Fi only. They must avoid using shared or public Wi-Fi for accessing and sharing the company's<br />

data.<br />

● Limit access to important files and data.<br />

● Two-factor authentication must be used for allowing access to the company's database.<br />

● All the tools and software used for communicating and data transfer must be encrypted.<br />

● Employees must be asked to limit their online activities on the devices that are used for accessing<br />

the company's database.<br />

● Employees must be restricted from sharing any details and passwords with unauthorized people.<br />

Company's data should not be shared with anyone, not even with the family members.<br />

● Employees must be trained for the usage of online tools and software to decrease the chances<br />

of human error.<br />

● Employees must also be educated about online safety and how to stay safe from phishing emails<br />

and invading malware.<br />

● Companies should have a proper IT infrastructure to monitor remote devices connected with their<br />

system.<br />

● Notifications must be set to get an alert in case of any security risk from any device connected<br />

with the system. This device should be immediately removed from the system and denied access<br />

for the time being.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 52<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!