Working with COVID-19 poses a number of cyber risks.
COVID-19 | Mar 23, 2020

COVID-19 Cyber Risks Caused by Telecommuting

COVID-19 Cyber Risks Caused by Telecommuting

A New Normal with COVID-19 — Working from Home May Create Security Issues

Given the implications of the coronavirus (COVID-19) outbreak, countless employees across a variety of industries are now working remotely. While this allows businesses to remain operational, it can create a number of risks, particularly for those who fail to take the proper precautions. 

Train Your Employees to Prevent COVID-19 Cyber Risks

Above all, information security is one the greatest challenges for companies allowing remote work during the COVID-19 outbreak.

When an employee is at the office, their work is protected by safety standards that keep your company’s network and data secure. However, an employee working from home may not have the same safety measures in place to protect your organization’s devices and information.

In order to safeguard your business and employees from data breaches, cyber scams and viruses, consider the following strategies:

1. Train Employees How to Detect and Respond to Phishing Attacks

Criminals prey on unfortunate circumstances, seeking to capitalize on victims during times of panic and hardship. Unfortunately, the COVID-19 pandemic is no exception. Cyber criminals have been known to pose as charities and legitimate websites to lure victims into sending money and revealing personal information. Individuals should scrutinize any emails, texts and social media posts related to COVID-19 and be cautious when clicking any links and attachments.

Specifically, instruct employees to:

  • Avoid clicking links from unsolicited emails, and be wary of email attachments.
  • Use trusted sources when looking for factual information on COVID-19, such as CDC.gov.
  • Never give out personal or financial information via email, even if the sender seems legitimate.
  • Never respond to emails soliciting personal or financial information.
  • Verify a charity’s authenticity before making any donations.
  • Use a training platform such as HRCompli E-learn to train and track training easily.

2. Have a Virtual Private Network (VPN) in Place

Have a virtual private network (VPN) in place, and ensure employees are using it to access company systems and data when working remotely. VPNs encrypt internet traffic, which can be particularly useful when your employees connect to a home or public network. Furthermore, it could be beneficial for your company to prohibit employees from accessing company information from public networks altogether.

3. Mandate the Use of Security and Anti-Virus Software

This software should be up to date and include the latest patches.

4. Educate your Employees on the Kinds of Sensitive Data they are Obligated to Protect

This could include confidential business information, trade secrets, intellectual property and personal information. When working with sensitive data, employees should take to the same precautions they would if they were at the office. They should avoid using their personal email for company business and think critically about the documents they are printing at home. If they must print sensitive information, they should shred the document when it is no longer needed. Encrypting sensitive information can also help you protect any data that is stored or sent to remote devices.

5. Prohibit Employees from Sharing their Work Devices with Friends and Family Members

Doing so reduces risks associated with unauthorized or inadvertent access of company information.

6. Have Employees Update their Contact Information

Have employees update their contact information. That way, if your systems are compromised, you can easily contact your staff and provide the appropriate updates and instructions.

7. Create and Communicate a System that Employees Can Use to Report Lost or Stolen Equipment

This will help your IT department respond quickly and mitigate potential data loss threats.

8. Require Two-Factor Authentication for All Company Passwords

Two-factor authentication adds a layer of security that allows companies to protect against compromised credentials. Through this method, users must confirm their identity by providing extra information (e.g., a phone number or unique security code) when attempting to access corporate applications, networks and servers. This additional login hurdle means that would-be cyber criminals won’t easily unlock an account, even if they have the password in hand.

9. Consider Security Precautions for Mobile Devices

Proper phone security is just as important as a well-protected computer network. A smartphone could grant access to any number of applications, emails and stored passwords. Depending on how your organization uses such devices, unauthorized access to the information on a smartphone or tablet could be just as damaging as a data breach involving more traditional computer systems.

Contact MyHRConcierge For Help with HR COVID-19 Issues

For additional protection, employers should consider backing up data and bolstering network protections as best as they can. For additional help with HR policies, cyber security guidance, or training, contact Chris Cooley at (855) 538-6947 ext. 108 or by email at ccooley@myhrconcierge.com.

©MyHRConcierge/Zywave

The HR and business professionals at MyHRConcierge are here to respond to your questions and concerns, and keep small to medium-sized businesses compliant with federal and state labor laws. Delivering personal service to our Partners and Clients is the heart and soul of our business.