As we move towards an era of an increasingly remote workforce, we need to ensure that users human error risk is reduced as much as possible. Cybercrime has increased since the pandemic, in part, it's suspected due to the remote workforce being a target due to their isolation from typical security defences. This blog discusses how to reduce the risk of human error with a remote workforce.
When thinking about the threats facing a remote workforce, many will think of the lack of IT infrastructure, use of own devices and other IT infrastructure issues that may occur. However, there is also a much larger risk of human error leading to an organisational threat such as malware or cybercrime.
When employee's are working remotely, they will be more easily targeted for phishing campaigns (due to lack of interaction/online interaction with colleagues). They will be more susceptible to social engineering attacks, or even simply physical risks such as leaving important documents in unsafe locations.
As many businesses have found, there are plenty of advantages that can come from remote working. However, managing this human error remotely can seem like an impossible task, however there are tools and tricks that can help you monitor and empower your workforce, to reduce the risk of human error to your business.
When working remotely, potentially the biggest threat to your workforce is through phishing attacks. At the time fo writing, in 2020 we have seen an increase in phishing attacks (SOURCE), perhaps in part due to remote working.
As employee's are isolated, and working on personal devices, hackers have assumed they are more susceptible to phishing attacks. This is perhaps true, as they may be swapping from personal and private accounts on devices, be communicating more through channels such as text and email, and therefore more likely to fall for a phishing attempt.
Increase in spear-phishing. Some have even reported up to a 30,000% increase in phishing attacks during the Covid-19 Pandemic.
Always ensure end users are aware of the potential risks of clicking links on emails, even if they seem legitimate as the one above. There are a few recommended steps to take to be able to spot a phishing emails
Securing your home network is key to working safely when working remotely. The first piece of advice is to change your factory default settings on your home WiFi router - the name and password that come automatically with the router, it is much easier for hacker's to gain access to this. Make sure to change your password to something secure, the current recommendation is 3 random unconnected words.
Next you should take steps to encrypt your network, WPA- 2 is seen as the industry standard and should be seen as a minimum requirement for your home router. Other settings may easily be exploited by attackers, who would then be more easily able to access the files in your network.
Changing your default IP address can be another way to ensure that your home network is secured. Your IP address is your unique identifier on the web, if hacker's are able to gain access to your IP, they can do a range of things; including duplicating your IP for illegal content, up to launching DDoS attacks with fake web traffic. By changing your IP it will make it more difficult for hackers to find.
If your router does become compromised by hackers, it's likely that the provider will install a patch - a way to fix the problem the hackers are exploiting. Most routers do not provide the option to automatically update, so you will have to do this manually. This will prevent hackers from exploiting any previous vulnerabilities that have been fixed.
Using personal devices is becoming increasingly common in the workplace, as people gain access to much more integrated, internet-connected devices. This can include anything from smartphones, tablets, laptops and more. In a more flexible and remote working environment, BYOD policies will become increasingly common. Therefore, it's important to make sure that these devices have been properly secured.
Employees are working different hours, which may choosing to work later, or outside the standard 9-5 operating hours. This puts them outside the help of the security team. It is also especially easy to launch a social engineering attack when employees are working remotely due to the different nature of communication, imitating and manipulation can be much easier online.
Hacker's may try to imitate:
Whenever a new person from your clients' or partners' organisations contact you for the first time, always verify their identity first or check with someone who has worked with them before.
If a plumber, repairman, IT support team member or anyone else requests to be let inside the company's premises, always ask to see their ID first. If they are who they say they are, they will always be carrying ID on them.
Never share or give your passwords to anyone. A legitimate member of IT staff would never ask for your password.
Never plug in devices to your computer unless you are completely certain of their owner and their contents.
Contest people attempting to tailgate, or people walking in the premises without an ID.
If you're not certain of who you are speaking to over the phone or over email, call back the person or organisation who you believe you should be speaking to directly.