Finally getting the hang of the work-from-home culture!
By now, you should have a dedicated spot in your home as your new
“Office” away from your office and as strange as it was at first, I bet you
have settled and have found your way through basic challenges of the
“Work-from- Home” culture. Look at you, a passionate employee who’s not bound
by any limitations when it comes to business productivity and performance
excellence.
Working from home, also called teleworking and telecommuting, is a work arrangement in which employees do not
commute or travel to an office for work, but instead work from home or a
location close to home. While some employees have been using this method for a
while to ensure business productivity, most companies are now forced to
practice this way of working as many countries have been on lockdown as a
measure to prevent the spread of COVID-19 which has been declared a global
pandemic. Although working from home may represent many benefits, it also comes
with a great cybersecurity threat to a company’s private network.
The Cybersecurity Threat that comes with it…
Cybersecurity simply refers to the practice of protecting systems,
networks and programs from digital attacks usually aimed at accessing, changing
or destroying sensitive and private information to cause business interruption.
Recent studies have shown that while there may be various ways of ensuring
cybersecurity in a workplace, the greatest cyber threat in any network are its
Users: employees who access a company’s network, systems and programs on a
daily basis.
Being a cybersecurity champion for the company you work for!
Whether intentionally or not, employees are at the greatest chance
of distorting a company’s network, especially when working from home where
there is limited to no monitoring to ensure proper implementation of
Information Technology policies. Here is how to become a cybersecurity champion
for the company you work for, while working from home:
Avoid sharing your password
with anyone: Your password is your
unique digital footprint, giving you access to company resources and which
is meant to identify only you. Sharing
it may mean giving unauthorized personnel access to sensitive information that
they may distort or misuse.
Avoid opening unknown links
or pop ups: Malicious threats normally come in a
form of links and emails that might seem legit or unsuspicious from unknown
sources. Avoid being quick to open such links before verifying their legitimacy
with your IT department, as phishing attacks often stem from such instances. Phishing refers to a fraudulent
practice of sending emails purporting to be from legitimate companies
compelling individuals to reveal confidential information.
Log out of
portals/Systems/Software when you’re done using them: This might seem obvious, but it is very important to practice logging
out of a company’s systems and devices when you are not using them. Most recent
software automatically log users out when they do not detect any activity from
the user after a set period of time. This is a great security control; however,
it is ultimately the responsibility of the user to ensure data protection of
the company systems they use. Leaving systems online makes them vulnerable to
hackers. In a case of working from home, it could lead to kids unintentionally
altering/sharing confidential company data which you would be liable for.
Use Only IT department
authorized/recommended software/programs when performing work activities: Most companies invest in
licensed applications, software and systems depending on various factors which
could be the industry they operate in, the IT policies they have in place, the
kind of information they deal with, the kind of clientele they cater for etc.
The beauty of these licensed software is that they normally come with extra
security and monitoring features, making them extra secure to perform
transactions ethically. It is important to use only recommended or licensed
programs by your company’s IT department to avoid exposing company
private/sensitive data to unauthorized and possibly malicious third parties.
Communicate with your IT
department personnel: Make it a habit to frequently
liaise with your IT department on issues you suspect could be malicious, faulty
or any suspicious activity on your laptop. These issues may be all the pointers
afore mentioned as well as hardware issues as minor as they may seem.
The reality of COVID-19 presents numerous challenges. We have to
come together globally to overcome these challenges, and when prepared, cybersecurity should
not be one of them. Stay safe.
Kelebone Mona ǀ IT Administrator ǀ Minet Lesotho
Comments
Post a Comment