Cyber security news for all

More

    Measure to avoid the risk of virus contamination between hardware and IT system

    Companies limit the IT risks associated with remote work by means of specific protective measures and technical solutions.

    Profiling The Home Office

    It is crucial for a company to determine in advance profiles of remote workers depending on their area of ​​responsibility and what information teleworkers can access. The security mechanisms for occasional remote workers and for full-time home office workers may not be the same. The first step in preventing outside intrusion into the company’s information system is to introduce a system for identifying the home office worker, which will take effect as soon as it connects to the company system. Ideally, you should rely on multiple authentication.

    Separation And Protection Of The Hardware

    The simplest measure to avoid the risk of virus contamination between the employee’s hardware and the company’s IT system is still to assign the teleworker a computer for professional use only, which is updated regularly by the IT staff to the required level of security. The user must not be granted administrator rights on the computer provided by the company. However, almost 30% of the workforce is not provided with a smartphone or laptop by the company. This should be a thorn in the side of IT managers, especially at times when it is advisable to work from home.

    The data flow between the workplace of the employee and the company network can also be secured by the VPN. However, this security device is not even installed on many private computers. In itself, this model can be temporarily replaced by the use of a multi-secured virtual office platform. These cloud platforms make it possible to access sensitive company data from anywhere and from any computer. What ultimately counts, is the integrity of the company data, which is saved or processed on the local private computer in order to be subsequently fed into the company network. Securing them requires a whole series of measures that require time for implementation and that can only be pushed to a limited extent with private devices, which is why it is advisable to coordinate them exactly with the home office.

    Recent Articles

    Hackers stole thousands of passport data in Argentina

    In response to millions of dollars ransom refused by the Argentine Immigration Service, a ransomware group released passport data from hundreds of thousands of...

    USA wants to improve cybersecurity of space systems

    CISA has published a table this week that summarizes Chinese activities against cybersecurity. Some attacks have succeeded and enabled hackers to gain a foothold...

    Unknown attackers had access to personal data of Warner Music

    Warner Music Group has admitted a security incident in which customers card details were stolen in some of the company's online stores. Warner Music...

    Donald Trump wants to force a sale of TikTok to Microsoft

    It was recently announced that President Donald Trump plans to prohibit business with the owners of TikTok by decree. The American head of state...

    PIN protection is cracked for contactless payments

    Contactless payments by card only works up to typically 30 dollars without a PIN. The PIN is actually  requested for high payments. This is...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox