Cyber Defense eMagazine June 2020 Edition
Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Risks of Working from Home<br />
COVID-19 has forced the corporate industry to opt for remote working in place of an office setting. This<br />
has increased the risk of a data breach. The major causes of this increase in risk are:<br />
● Work from home means that several devices are connected to the company's database. This<br />
increases the chances of data theft and leakage.<br />
● The flow of data to and fro the company's system is carried out through multiple networks with<br />
varying security levels. This eases the work of predators and cybercriminals.<br />
● Most of the employees working in a traditional setting are not familiar with the usage of online<br />
tools. This increases the chances of human error and mishandling of data.<br />
● Unprotected devices are always an easy target for phishing emails and malware. Just one risky<br />
device or a single random click by any employee can risk the whole system.<br />
Checklist for GDPR Compliance<br />
Here are some necessary measures that your company or organization must take, especially in this<br />
current situation of remote working, to maintain their compliance with GDPR.<br />
● The company must update its privacy policy for employees working from home.<br />
● New agreements must be made with third parties and outside vendors to maintain compliance<br />
with GDPR.<br />
● All the employees should be provided with secured devices by the company.<br />
● If employees are using their own devices, they must be well protected with an up to date version<br />
of antimalware and firewall.<br />
● The encrypted network is a must for data security. Therefore, the company should provide VPN<br />
protected Wi-Fi devices to all the employees working from home.<br />
● If the employees are using their own Wi-Fi, they must be restricted to use password-protected<br />
Wi-Fi only. They must avoid using shared or public Wi-Fi for accessing and sharing the company's<br />
data.<br />
● Limit access to important files and data.<br />
● Two-factor authentication must be used for allowing access to the company's database.<br />
● All the tools and software used for communicating and data transfer must be encrypted.<br />
● Employees must be asked to limit their online activities on the devices that are used for accessing<br />
the company's database.<br />
● Employees must be restricted from sharing any details and passwords with unauthorized people.<br />
Company's data should not be shared with anyone, not even with the family members.<br />
● Employees must be trained for the usage of online tools and software to decrease the chances<br />
of human error.<br />
● Employees must also be educated about online safety and how to stay safe from phishing emails<br />
and invading malware.<br />
● Companies should have a proper IT infrastructure to monitor remote devices connected with their<br />
system.<br />
● Notifications must be set to get an alert in case of any security risk from any device connected<br />
with the system. This device should be immediately removed from the system and denied access<br />
for the time being.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 52<br />
Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.