Close Menu
  • Business
    • Market Place
  • Devices & Gadgets
    • Buyers Guide
    • Trending
    • Social
  • Mobile & Telecoms
    • Broadband
  • Innovations
    • APPS
    • Start-ups
    • Software
    • AI ( artificial intelligence)
    • Auto-Tech
  • Health
    • Security
  • State
    • NCC
    • NiRA and .ng
    • NITDA
  • i-Sports
    • i-tertainment/Gaming
    • I-TV/Podcast
  • Reviews
    • Opinion
    • Special Report
    • Editorial and Analysis
  • Others
    • Events
    • Archive
    • Interviews
Facebook X (Twitter) Instagram
Latest
  • KongaPay Raises the Bar with Three ISO Certifications
  • SeerBit, Spectranet Launch ExpressPay to Revolutionise Internet Subscription Payments
  • Zinox Group’s Vision for Empowering 10,000 Women in Tech
  • FBNQuest Hosts Estate Planning Summit
  • TD Africa’s TecHERdemy churns out 400 female graduands
  • PAFON 2.0: Experts Highlight Ingredients for Accelerated Financial Inclusion in Nigeria
  • Starlink Gen 3 Kit Revolutionizes Satellite Internet in Nigeria
  • NITDA calls for public inputs on Digital Public Infrastructure document
Facebook X (Twitter) Instagram YouTube LinkedIn
IT NEWS NIGERIAIT NEWS NIGERIA
Subscribe Now
  • Business
    • Market Place
  • Devices & Gadgets
    • Buyers Guide
    • Trending
    • Social
  • Mobile & Telecoms
    • Broadband
  • Innovations
    • APPS
    • Start-ups
    • Software
    • AI ( artificial intelligence)
    • Auto-Tech
  • Health
    • Security
  • State
    • NCC
    • NiRA and .ng
    • NITDA
  • i-Sports
    • i-tertainment/Gaming
    • I-TV/Podcast
  • Reviews
    • Opinion
    • Special Report
    • Editorial and Analysis
  • Others
    • Events
    • Archive
    • Interviews
IT NEWS NIGERIAIT NEWS NIGERIA
Home»Business»Working remotely during Summer 2023: 5 steps to protect yourself from cyberattacks according to Sophos
Business

Working remotely during Summer 2023: 5 steps to protect yourself from cyberattacks according to Sophos

IT NEWS NIGERIABy IT NEWS NIGERIAJuly 14, 2023No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
Share
Facebook Twitter LinkedIn Pinterest Email

 

Advertisement

With the arrival of summer, teleworking becomes the priority option for many workers, but it is necessary to take into account the risks and threats involved in moving the workspace to a new location

 

Before the pandemic, cybersecurity started to be considered as a fundamental area in a company. But it’s really after the implementation of teleworking during confinement and the cyberattacks that many companies suffered, due to the exposure of their devices, that IT teams are increasingly focused on raising awareness among their workers. The objective is clear, shield each access point to the business network and monitor it to avoid active threats, making remote work a secure and flexible option.

 

“At the time the health emergency arose, companies had to apply various measures to continue operating from home, but, although the crisis passed and companies returned to normality, teleworking has remained in many cases. In the first instance, it is the companies that are taking measures to increase their levels of cyber protection, but in addition to that, users can also take measures that accompany them and that allow them to telework from wherever they want while maintaining protection”, explains Chester Wisniewski, Field Sophos CTO.

 

Flexibility or family reconciliation are some of the advantages offered by this modality, so it is not surprising that it is an option that many workers choose for the summer season. Although at an operational level changing workplaces seems simple, it is important to take into account a protocol for prior actions. Cybersecurity experts at Sophos, a global leader in innovation and delivery of cybersecurity as a service, offer five steps to take to avoid risk and concern in what should be a happy and pleasant time:

 

1. Previous preparation. Just as you must prepare your devices and materials to establish your office in the new destination, you cannot forget to condition them internally, for this, check that your devices have the appropriate security software installed and that they comply with the compliance policies and security of your organization. solutions are patched and protected.

 

2. Training. Most cyberattacks start with a vulnerability in the weakest link in the chain, that is, the users. Workers can be the gateway used by attackers to access the rest of the company’s devices. This makes it necessary that, as a worker, it is important to acquire basic knowledge to know how current and identify in time if you are being attacked, either by your company or by your own account.

 

3. Double check. If you receive an unexpected communication from a coworker or business that seems out of the ordinary, don’t respond directly, rather contact the person or organization using another communications method like phone or SMS to ensure they are who they say they are.

 

4. Apply updates as soon as they are available. This is easiest on our phones and computers as we are usually prompted to update them, but don’t forget your internet router and smart home things. It is a good practice to check them all for available updates at least once a quarter.

 

5. Don’t forget to keep the “essentials”. Finally, despite carrying out all the previous steps, we must not forget the most basic protection measures that represent the entry barrier. First, set unique passwords for all your accounts and use a password manager to help keep them long and secure. Ideally, use multi-factor or “two-step” authentication wherever available to provide additional protection.

 

“Today most devices are used when connected to the internet, so you have to maintain a mindset where devices are considered to be in a hostile environment at all times. The idea that the safe space is inside offices and the insecure one outside is outdated. Now, anywhere you can suffer an attack, but it is true that sometimes when we move along with our workplace we do not take the necessary tools with us, so it is important to be vigilant”, adds Chester Wisniewski.

Post Views: 277
Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
Previous ArticleDigital Encode at 20: The House Adewale Obadare and Seyi Akindeinde Built
Next Article Sophos Launches Managed Detection and Response (MDR) for Microsoft Defender
IT NEWS NIGERIA

Related Posts

2 Mins Read

KongaPay Raises the Bar with Three ISO Certifications

May 7, 2025
3 Mins Read

SeerBit, Spectranet Launch ExpressPay to Revolutionise Internet Subscription Payments

May 7, 2025
3 Mins Read

FBNQuest Hosts Estate Planning Summit

April 30, 2025
2 Mins Read

TD Africa’s TecHERdemy churns out 400 female graduands

April 24, 2025
Leave A Reply Cancel Reply

About Us
IT NEWS NIGERIA (www.itnewsnigeria.ng) is an on-line platform aimed at enriching Nigeria and Africa content in the cyberspace.

We believe the future is online.
Popular Updates

Design Bootcamps vs Self-Taught, A product designer’s perspective

March 22, 2024

How to get N100,000 loan @3% at Zenith Bank and other services

November 12, 2020

Interview: From Start-ups to Big Brands: Growth Marketing Strategies that work by Oluwasekemi Akinbo

May 18, 2023

Subscribe to Updates

Get the latest tech news & updates from IT NEWS NIGERIA

Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn
  • About Us
  • Privacy Policy
  • Terms of Service
  • Advertise With Us
  • Contact Us
© 2025 IT NEWS NIGERIA.

Type above and press Enter to search. Press Esc to cancel.

Signup to our Newsletter