<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=905697862838810&amp;ev=PageView&amp;noscript=1">
Fraud & Cyber Security | 3 min read

Remote Workforce Information Security Tips

Working from home presents a whole new host of unique information security risks. Although being at home can tend to make people more lax about important information security habits, this is actually a time when we will need to be even more vigilant than usual, as cyber criminals look to take advantage of vulnerabilities.

What can you do to help protect your company, employees, and clients from exposures? In this blog post, we’ll discuss important information security tips and reminders to aid business leaders in ensuring that their sensitive data stays safe and protected.

Think before you click

Be aware that the COVID-19 pandemic presents a prime opportunity for cyber criminals. Criminals continue to take advantage of those seeking information on coronavirus, as they leverage malware campaigns that imitate reputable sources like the Centers for Disease Control (CDC), the World Health Organization (WHO), or your local public health service. The impersonators will ask your employees to click on links or download materials such as outbreak maps, so it is important to remind your remote workers to think before they act. Consider sending out a companywide communication alerting employees about the importance of going straight to the source for information and updates by visiting only reputable websites. If you or any of your employees think they may be the subject of a phishing attempt to obtain sensitive information, be sure to have them alert your security team at once.

Related Reading: Beware COVID-19-Related Scams

Keep web conferencing secure

As working from home has become more prevalent, many organizations and employees have turned to web conferencing and virtual meetings for collaboration and communication. Although web conferencing has proven to be a valuable tool during this time, there are many security issues that can stem from the platforms that host them. Fortunately, there are important steps your organization can take that will help to reduce risks associated with web conferencing. As you and your team members work from home, please keep these tips in mind:

  • Only use company-approved web conferencing programs

  • Avoid continued reuse of access codes for meetings, as it will likely become difficult to remember all the people who have received the code over time

  • If you will plan to discuss sensitive information in the meeting, consider using one-time meeting PINs or multi-factor authentication for meeting entry

  • Ensure meetings can only begin once the meeting host has arrived

  • Enable sound notifications for when new attendees enter a meeting, and if this feature is unavailable, ask attendees to announce themselves as they join a meeting

  • Monitor all attendees listed in the meeting dashboard, and if any members are unidentifiable (e.g., phone number listed instead of name), make sure to identify them

  • Only record virtual meetings when necessary, and delete the record when it is no longer needed

  • For web meetings that utilize communication tools, disable any features you will not need (e.g., file sharing, screen sharing, video, etc.), use PINs to help prevent “meeting crashers,” and limit who is able to screen share, making sure to remind them not to unintentionally share screens with sensitive information

Only use company-approved devices, software, and cloud services

Being at home can tempt employees to use devices for work other than those your company has approved. However, such unapproved use can lead to significant information security issues. The same is true for installing unapproved software and mobile apps, as these practices can leave company devices, and, on a larger scale, the company as a whole, open to cyber attacks.

While convenient, cloud-based services such as collaboration tools, storage and file-sharing, and analytics software may expose company information to unauthorized persons. To avoid these serious risks, make sure to remind your remote workforce to only use company-approved and vetted technology.

Get a cyber liability insurance policy for your company

All businesses face cyber risks, and while they may not be completely avoidable, creating an testing a response plan, educating your employees, and obtaining proper cyber liability insurance coverage can help protect your business from the financial and operational dangers of a cyber security breach. Ensure that you fully understand your coverage and policy limits, especially for social engineering threats like business email compromise or CEO fraud.

Cybersecurity Checklist 2021

Related Categories

Fraud & Cyber Security

Jeffrey Julig

Jeffrey Julig joined SWBC in January 2016 and currently serves as Senior Vice President and Chief Information Security Officer (CISO). He leads a dedicated team of security and business continuity professionals, ensuring the protection of SWBC’s diverse business lines from internal and external threats. His mission is to safeguard the security, privacy, and resiliency interests of the organization and its clients. Before joining SWBC, Jeffrey served in the United States Air Force for over 25 years, honing his leadership and technical skills in high-risk, no-fail national security environments. He attended the Department of Defense Cybercrime Investigations Training Academy (DCITA) and is a former certified digital forensics examiner. He completed the San Antonio FBI Citizens Academy and is currently a member of Cybersecurity San Antonio and InfraGard San Antonio. Jeffrey earned a Certificate of Achievement in Advanced Cybersecurity from Stanford University and completed Stanford’s Cybersecurity and Executive Strategy course. He holds a Bachelor of Science in Cybersecurity from the University of Maryland University College. Additionally, he earned 14 professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Privacy Technologist (CIPT), and global information assurance certifications (GIAC) in Strategic Planning, Policy, and Leadership and Law of Data Security and Investigations.

You may also like:

Fraud & Cyber Security

Understanding the Sensitivity of Cyber Liability Policies

With the many threats faced by businesses today, leaders must be vigilant about protecting their cyber liability policie...

Fraud & Cyber Security

Cyber Liability Underwriters Require Companies to Do These 6 Things

If your organization isn’t practicing basic security hygiene, you may not have access to cyber liability insurance. Most...

Fraud & Cyber Security

Common Retail Insurance Claims and How to Avoid Them

Retail business owners often operate on tight margins, and challenges like shoplifting, employee theft, weather and fire...

Let Us Know What You Thought about this Post.

Put your Comment Below.

Blog-CTA-Icon_Webinar-Video

FREE WEBINAR

Navigating Mental Wellness: Strategies for Conquering Workplace Challenges

Join our webinar for strategies on mental wellness and prioritizing your and your employee's well-being. 
On Demand | Duration: 52 minutes

Watch Now