DEV Community

etcdigitalfr
etcdigitalfr

Posted on

Computer security and teleworking: best practices

Teleworking has become possible, sometimes necessary or essential to maintain the business thanks to new technologies. But this means that the risk in terms of IT security is again higher. Have companies adopted the right practices and secured their data? Very few still today, but it is never too late to increase the level of security of its IS, OTO Technology gives you the good practices.

Telecommuting: what are the IT risks for your company?
There are many IT risks that you may encounter when telecommuting. It is essential to define them well, to understand the degree of danger of each of them and to find solutions to avoid any disaster.

Phishing
Phishing is a real threat that increases with telecommuting. Very often, employees may receive an e-mail inviting them to open an attachment or to click on a link to enter personal data. This is a way to roll out the red carpet for a cybercriminal to access your company's information system.

Data theft
This is also a major risk that can heavily affect the durability of companies. In the context of telecommuting, a poorly secured network or remote access is a new door that opens for hackers. Data theft is often used to hack people's identities, practice phishing or even resell these data.

Ransomware
Ransomware is a very specific attack. The cybercriminal blocks access to your data by encrypting it and demands a ransom to unblock it. The financial consequences are particularly serious.

Fake transfer orders
Fake money transfer scams continue to occur in France at a high level. Aiming at pushing an employee to make a bank transfer on a fraudulent account, by impersonating a partner, service provider, etc., they jeopardize the financial health of your company.

The challenges of IT security in the context of teleworking
The implementation of a telework policy is not without risks and the consequences can be very heavy. Companies need to take preventive measures to secure their working environment even from a distance.

Companies must be aware of the impact of a lack of anticipation. A cybercriminal attack can have consequences on three levels:

Financial:
The first consequence that can be imagined in the event of an information system attack. If you no longer have access to your tools, if a lack of data prevents you from working, naturally, the financial loss can be heavy. And it will be more or less important according to the duration of the interruption of activity;

Brand image:
How will your partners, customers, service providers, etc. react in case of an attack? If you are no longer able to carry out your mission because your information system is corrupted, will they continue to trust you or will they turn to the competition? If you lose confidential data and they end up in the hands of cybercriminals, again, your brand image will be tainted and you could lose many customers and partners, the economic and human consequences could be heavy ;

Legal:
The loss of data, the delay in the delivery of a good or a service, all this can also have heavy consequences for your partners. As a result, they may decide to take legal action, which could ultimately weaken your company.

Limiting IT risks while teleworking: it's possible!
Now that you have a better understanding of the risks and consequences of poor IT security. It's time to take measures to limit these risks and work in complete serenity. Here are the recommendations of OTO Technology so that telecommuting is not a stress factor and that you are able to adapt to all situations. Like the health crisis that we are living, which disrupts the organization of work of companies and which should not be an additional risk factor.

Securing the remote connection: generalization of the VPN
The most important point. When teleworking, your employees will have to connect to your network remotely, opening all possible doors to malicious people. This network must be secured in the best possible way, especially thanks to the SSL VPN which will encrypt the information and thus make it less accessible.

Separate uses: dedicated user session
When working from home, employees take risks. Indeed, they connect with tools that, sometimes, are not secure. It is essential to keep business and personal tools separate. If the company has set up a computer with secure access, firewalls and antivirus software, only this equipment should be used. The risks multiply when telecommuting when employees use their personal laptops, tablets or smartphones to connect, answer emails, etc.. However, these tools are very rarely protected.

sources
references

entreprise infogérance

entreprise maintenance informatique à Paris

entreprise de sécurité informatique à Paris

entreprise de câblage informatique

Top comments (1)

Collapse
 
divleva profile image
divleva

I believe that the issue of protecting your own data will become paramount in our society in a few years. You can always have your passwords or card data stolen if there is a "tip-off.
First of all, I use two-factor authentication where possible. This allows me to see which device is trying to log into accounts.
Second, complex passwords.
Third, I occasionally use a paid VPN. This is generally not necessary. I can only recommend an article with a review on the best services en.vpnwelt.com/review/.
I used to use a free one, but my needs increased, so I had to switch to more serious resources.