Cybersecurity is an industry that never slows down, and with the emergence of remote and hybrid work, the processes and needs your team requires from the IT help desk have shifted as well.
To help protect your work and your business in this new normal, here are some quick remote cybersecurity tips.
Secure Your Meetings
- Use Waiting Rooms. This allows the meeting host the ability to admit participants into the meeting one at a time, or all at once.
- Lock your meeting once everyone is present to prevent others from sneaking in and joining the meeting once things have been started.
- Manage sharing capabilities within meetings. If you are in a meeting with a mix of personnel (managers, executives, associates, and assistants, for example), be sure you enable or disable participants’ ability to share screens, use the chat functions, etc.
- Protect your virtual meetings with strong passwords whenever possible.
- If you are archiving or sharing meeting recordings, make sure those are also password-protected.
- Rather than sharing meeting links and details publicly or on social media, create a landing page or have potential attendees contact someone central to your meeting to obtain the registration and password details.
- Always remove and block anyone in your meetings whose identity cannot be verified.
- Be strategic in how you share sensitive or regulated information within virtual meetings. When possible, have participants access this information prior to the meeting so as not to expose anything sensitive.
Secure Your Devices
- Install antivirus software on all your tech devices, even if they aren’t a computer or laptop. Only 49% of smartphones and 50% of tablets are protected by antivirus software.
- Check for updates frequently and don’t put them off. The best way to do this is to make sure auto-updating is enabled on your devices. It is a temporary decrease in productivity that promotes long-term health and security.
- Beware of malicious mobile apps. Don’t download apps from third-party app stores and be sure to check app permissions before you download anything.
- Make sure your endpoint security can protect devices and your network from unwanted interactions, regardless of the device’s physical location.
Employ Best Practices When Online
- If you receive a message that tells you to ignore or bypass the standards or protocols you have been taught, reach out to an IT professional or a manager in a separate forum. Malicious actors often use a sense of urgency or threat of punishment to trick people into allowing access to sensitive data or software.
- If an atypical request comes through from a user you know, be sure to check the information thoroughly. For example, many fraudsters will send an email and set their profile name to one that matches a CEO or other leader in your company, but the email address doesn’t match that person’s official one. Be sure to mouse over the displayed name to make sure you are really speaking to the right person.
- Enable and enforce two-factor authentication wherever possible.
Implement High-Level Cybersecurity Solutions
We also have a blog post about the 77 cybersecurity tips to implement this week, you can read it here.
CyberFort Advisors offers world-class protection that you can control. Check out our CyberFort Black services as well as our range of other SOC and compliance offerings to handle your remote cybersecurity needs. Contact us at 1 (866) 221-4004 or email [email protected] to learn more.