Cyber security news for all


    Home office rules to protect data security against corona hackers

    The corona virus is spreading worldwide and more and more companies are thinking about home office and mobile work. The demand for video conferencing software is increasing steadily. At the same time, tech companies such as Google are relying almost entirely on home work. But it is not that easy if a company has not yet had any experience with it.

    Keep An Eye On Labor Law

    Basically, bosses have the right to issue instructions, but when it comes to where the work is done, the scope is limited. As a rule, the employment contract specifies where the place of work is. The employee only has to comply with the order to work at home if the arrangement of home office is provided for in the employment contract, collective agreement or company agreement. If there are no corresponding agreements, they actually have to be negotiated. A company agreement should be concluded for this and the works council must be involved to protect the companies network.

    Communicate Properly And Take Care Of Data Security

    When employees work at home, communication changes, in contrast to presence work. Instead of meetings, people meet in telephone and video conferences, instead of calls they receive messages. But that’s not easy. After all, communication always has a non-verbal level. And this is made more difficult if you don’t see the other person or only see it with video. When conducting conference calls, it is important to define the role of moderator in advance and then to fill it out. So that communication does not suffer, this can also mean that the moderator interrupts individual participants in the conversation. More non-verbal communication is possible in video conferences which increases the risks of cyber security. The experts advise that this should be used for important meetings.

    Recent Articles

    Russian Cybercriminal Behind “Cardplanet” Site Sentenced

    According to the United States Department of Justice, a Russian cybercriminal, Aleksey Burkov, 30—who operated Cardplanet site: a site that trafficked stolen card details—has...

    Hackers Used Malicious Docker Images to Mine Monero

    Researchers found malicious images on Docker Hub used for crypto mining. Palo Alto Networks' Unit  42, unraveled a crypto mining scheme which uses malicious Docker...

    NSA outlines requirements for secure collaboration services for US government telework

    The new National Security Agency (NSA) guidelines are a window of security for users. Everyone has been trying to return to their lives since...

    Cybercriminals threaten to sell off “scandalous” files swiped from Mariah Carey, Nicki Minaj, Puff Daddy’s legal eagles

    There's no escaping these cybercriminals. In a recent case of "cyber-extortion," threat actors known as REvil, are threatening to expose celebrity "dirt." These threat actors...

    Twitter apologises for exposed customers data

    In what is described as a "data security incident," sensitive details of Twitter's customers were exposed. Unlike other cases of a breach which are...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox