Home Back New search Date Min Max Aeronautics Automotive Corporate Cybersecurity Defense and Security Financial Healthcare Industry Intelligent Transportation Systems Digital Public Services Services Space Blog Cybersecurity Three Ways a Lockdown Might Increase Your Company’s Digital Risk 22/04/2020 Print Share This post is going to look at three ways in which a firm’s digital risk might increase and provide tips on how to mitigate this risk. 1. Telecommuting In Spain’s current lockdown all movements have to be pared down to the bone. Major companies now have the procedures and technology to deal with this problem, but firms that need the daily on-site presence of their workers are not always able to change their working methods overnight. Working with a skeleton crew may be the best way of reducing risk while the lockdown remains in force. For companies where telecommuting is feasible, however, some simple security measures might help reduce their digital risk: Make sure any device being used outside the office can be tracked down and deactivated remotely in the event of loss or theft. Any device, including memory cards and thumb drives, used for “taking work home” must be encrypted to prevent important company information from falling into the wrong hands. The ideal security-reinforcement rule would be for the whole hard disk of laptops leaving the office to be encrypted too. Use remote access systems like VPN and virtual desktop infrastructure (VDI) to prevent third parties from being able to hack at-home connections. 2. Prevent phishing attacks If the entire team is telecommuting, email use will soar. Wrongdoers are well aware of this, making emails an obvious target for phishing attacks. Once again, however, a series of security measures can reduce this risk: Tell the whole staff to deal with suspicious emails cautiously, especially those that ostensibly come from banks or those asking for personal passwords and details. All links must be carefully checked before being clicked on. It is also important to compare information received with former information from the same ostensible source. Ensure financial transactions are properly authorized, ideally by more than one person. Additional steps may be tagged on, such as calling suppliers to check the message is bona fide or canceling automatic payments. Recommend employees report anything that looks suspicious and share information on confirmed phishing attacks with their colleagues to raise awareness on the matter. 3. Application access management If necessary, set up remote application access; the use of a VPN and VDIs could boost security, especially in the case of applications accessible only from the office. Drawing up a plan and a clear policy of need-to-know access management will lead to a better understanding of the measures that have to be implemented. Many business applications have secure access tools enabled, and these should be used in situations like this lockdown. Enable multi-step authentication. If SMSs are trusted as an authentication method, then the best idea is to use a company telephone number. If possible, use access restriction by IP; this allows security IP lists or IP ranges to be drawn up, from which employees have to access the company domain. Implement a password administrator to prevent them being saved or shared via email or other applications. If the decision is made to continue carrying out projects during the lockdown, then all due effort must be made to ensure remote server access is restricted and secure. Don’t use real data on any cloud development environment. If possible, check the system with an external service provider specializing in pentesting, asking them to audit it and pinpoint any vulnerabilities, thus allowing you to correct and guarantee complete system security. Reducing digital risk at all times is simply good business Even companies with the very best security systems and processes are vulnerable to attack. For example, attacks on companies with loyalty cards may be provoked by theft of unrelated credentials. When the credential theft involves company email addresses the challenge is even greater, especially if the companies are providing remote access to applications for the first time. Early detection of vulnerabilities in stolen credentials means your business will be better prepared for taking proactive measures. There are many damage-limitation measures that can be taken; the sooner these measures are implemented, the quicker the risks and their aftermath will be reduced. Author: Marcelino Pérez Zamarrón Print Share Comments Your name Subject Comment About text formats Restricted HTML Allowed HTML tags: <a href hreflang target> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id> Lines and paragraphs break automatically. Web page addresses and email addresses turn into links automatically.