Work from Home: Security Challenges and Preventive Measures


Cyber Security best practices that everyone should know

Fast facts:

  • The novel corona virus is changing every aspects of our lives.
  • we are completely locked down due to this pandemic
  • The working pattern (9-5 office Job) is not possible due to nCOV-19
  • Some employers advise, “Stay home, Work from Home”- Teleworking
  • Teleworking can be the better solutions but stills has many limitations
  • Working from home could increase cyber security risks as well.
  • Tools like VPNs can help protect data and online connections, but workers may need to adapt in other ways.
  • Scam alert: Corona virus-related phishing emails aim to trick staffers with fake company policies.
  • Our readiness to change our behavior and culture can be the barrier for teleworking
  • Teleworking demand commitment, sincerity with the people process and priority
  • Challenge your limit, never miss an opportunity

Few Questions?

  • Does it make a difference if you work for a small or midsize company?
  • Hackers often target large organizations, but smaller organizations may be even more attractive. Why?
  • When you work at a small or midsize company, it is smart to learn about cyber security best practices why?

The collective answer is-

No, it does not make any different whether you work for a small or big company. Cyber criminals may think small businesses have fewer controls and could be easier to penetrate. Cyber security best practices include some general best practices like being careful when participating in online activities, standing by company rules, and reaching out for help when you encounter something suspicious.

If you educate yourself about the small things that contribute to cyber security, it can go a long way toward helping to protect your organization’s data.

Personally, the way I see is there are three factors involves it cyber security. They are:

  1. Stake holders (Government, Communities)
  2. Organization (Employer)
  3. The workers (individual)


  1. Stake holders (Government, Communities)

This is the good time for us let us take as an opportunity to prove ourselves working together. As i believe, stake holders, communities, and public-private partnership and alignment required to make the changes. Active participation and involvement of the concern parties to formulate the policy draft, discussed and finalize the De facto standard to implement. Once we have the policy in hand need to transfer, regulate, and constantly monitor for effective implementation.

  1. Organization (Employer)

Experts believe that a group of hackers or a hacker often targets organizations rather than individual data because of the revenue. what experts believe to be unprecedented levels of phishing are there due to the COVID-19 pandemic.

The international group Called the COVID-19 CTI League is comprised of nearly 400 members, from over 40 different countries. An international group of nearly 400 volunteers with expertise in cyber security has formed to fight hacking related to the novel corona virus. The group spans more than 40 countries and includes professionals in senior positions at such major companies as Microsoft Corp (MSFT.O) and Inc (AMZN.O). One of four initial managers of the effort, Marc Rogers, said the top priority would be working to combat hacks against medical facilities and other front-line res-ponders to the pandemic.

How about our business?

It is COVID-19 pandemic crucial time for business. It is a good time to prepare and revised Business Continuity Plan (BCP). So, let’s take initiative to stay safe and move forward.

Here are some points

How businesses can respond

  • Understand the threats to your organization
  • Prepare for Teleworking (working from home)
  • Prioritize the protection of most sensitive information and business-critical applications.
  • Provide clear guidance and encourage communication.
  • Ensure that home-working policies are clear and include easy-to-follow
  • Make workers home-working environment secure.
  • Provide the right security capabilities
  • Endpoint protection on all laptops and mobile devices, including VPN tools with encryption
  • Enforce multi-factor authentication (MFA)
  • Filter malicious domain URLs
  • Follow best practices, regulatory guidelines, and Global standards
  • Invest in security systems for latest Cryptography, Web Application Firewalls, Backup, Secure Connections etc. as capital Expenditure (CAPEX).
  • Train and treat the employees as an asset and grow together.
  1. The workers (individual)

of course, attackers are also taking advantage of the fact that many people who are working from home have not applied the same security on their networks that would be in place in a corporate environment.

How individual can respond to cyber security

  • Maintain complex password
  • Protect devices with an antivirus solution
  • Update systems and software patches regularly
  • Avoid public Wi-Fi; if necessary, use personal hots pots or some way to encrypt your web connection.
  • Enable firewall protection at work and office
  • Be wary of COVID-19 scams
  • Avoid pop-ups, unknown emails, and links
  • Use a virtual private network (VPN)
  • Encrypt Sensitive Data in Emails and on Your Device Back up your files regularly
  • Do not install Malicious COVID-19-related applications that give attackers access to data or encrypt devices for ransom
  • Similarly, educate and train yourself with the communities, experts, and mentors
  • Do not mix personal and work (Keep Work Data on Work Computers)
  • Create a comfortable workplace
  • Contribute to your society with your expertise regularly

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!