CyberSecurity

National Cybersecurity Awareness Month: Ensuring Online Safety at Work

National Cybersecurity Awareness Month: Ensuring Online Safety at Work
[cz_image id=”cz_22940″ image=”12167″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_59386″ cz_title=””]It’s National Cybersecurity Month. This week we’re exploring cybersecurity in the workplace. Untrained employees can be one of the biggest vulnerabilities to your organization’s network security. Presumably every person in any given organization has their own computer. This makes every employee a potential target for hackers and scammers. A lack of cybersecurity awareness among end users puts businesses at risk due to factors like; phishing, negligence and thoughtless clicking of links. Here are some tips to ensure your employees know how to avoid putting your organization at risk.

 

#1 Create a Culture of Cybersecurity

It’s important to create an office culture that emphasizes the importance of staying safe online. All employees should have the understanding it’s the shared responsibility of everyone in the office to ensure cybersecurity. You probably have an I.T. department tasked with protecting the organization from cyber attacks, but all it takes is a mistake by one employee to allow an attacker access to your network.

 

#2 Create a Cybersecurity Policy & Provide Training

A Cybersecurity Policy is a document that should outline specific requirements for appropriate use of your organization’s devices, data, internet, email, passwords, etc. Your policy should apply to each employee, as well as contractors and any other person with access to your network and data. We highly recommend using one of the many templates available online, they will serve as an excellent starting point. Once you have a clear Cybersecurity Policy in place, make sure each employee gets a copy and hold a company-wide training to make sure everyone understands what is expected.

 

#3 Encourage Strong Passwords & Responsible Management

Encourage your employees to only use strong passwords that can’t be easily guessed or stolen. Passwords should be at least 8 characters long, use a mix of upper and lowercase letters and contain special characters. Passwords should never include things like birth dates or names or people and should be changed frequently. All employees should avoid writing their passwords down. If there are many different passwords that are hard to remember, consider a secure password keeper. Exchanging of credentials should also be avoided. Check out our helpful guide on how to make a strong password.

 

#4 Educate About Spam & Phishing

Phishing emails and calls are one of the most common risks your employees will face at work. Educating them about spotting and avoiding these attempts is critical. Train employees to be critical of things like vague titles, grammar mistakes, attachments, and unknown senders. In addition to the obvious attempts, make sure they understand that many phishing emails are sophisticated and designed to trick you into acting. Emails could appear to be from someone at the company or even a familiar organization. Teach employees to hover over any hyperlinks to preview where they will be taken if clicked. More detailed information about phishing attacks can be found here.[/cz_title][cz_gap height=”25px”]

[cz_title id=”cz_24372″ cz_title=””]

#5 Communicate About New Threats & Scams

Be sure to keep your employees informed about new threats. If there’s a particular phishing email going around or a breach, make sure they know about it. US-CERT (United States Computer Emergency Readiness Team) has a great resource for alerts on current security issues.

 

#6 Require Installation of Updates & Patches

Make sure employees know they are expected to install all available updates and patches. No clicking “maybe later”. These updates and patches often include the solution to combating the latest vulnerabilities. If you have an in-house I.T. team, have them double check that everyone is up to date.

 

#7 Remind Them to Lock Their Devices

Employees should be expected to keep devices password protected and lock them when not in use.

 

#8 Test Them

There are many great solutions for phishing simulation awareness training. Fake phishing emails are sent to your employees, allowing you to identify and address potential weak spots without ever putting your network in harm’s way.

 

#9 Discourage Unauthorized Software Downloads

We recommend requiring employees to check with your network administrator before downloading software to their computer’s. Even programs that are commonly downloaded onto home computers without a second thought can open your network up to risks like ransomware. Many times the software being downloaded and installed by employees is not even work related.

 

#10 Limit Internet Access or Establish Browsing Rules

If you’re not blocking employees from certain websites then it’s important to at least establish browsing rules. An internet usage policy should be outlined in your policy. This will help employees avoid risky behaviors like downloading questionable material, sending confidential information, visiting unsecured websites, and more.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

Related Posts