Pill 3 – Cyber protection and teleworking.
Although teleworking was gradually being introduced in companies, it is already a reality today. Companies have had to quickly adapt to having their staff distributed remotely. The devices have left the control zone of your company, so the probability of being attacked is greater.
For this, you need a action plan that guarantees cybersecurity in teleworking by following these keys:
- set a secure connection and avoid open Wi-Fi networks due to their security gaps
- The double authentication by the company and the employee, provide access only to authorized persons.
- Use of strong passwords and withdrawal of trust to the usual device from time to time
- The encryption or data encryption so that they can only be read by the personnel designated for that purpose.
- Avoid the use of personal devices or Bring Your Own Device (BYOD) poses a problem for IT staff who have less control over its use by employees.
- And the zero trust, which states that any organization can suffer both internal and external attacks, so trusting entities that enter its perimeter should be avoided.
Tranxfer, your partner to strengthen security in teleworking. Learn more about us at www.tranxfer.com!
Pill 3 – Cyber protection and teleworking.
- How to start with your Zero trust strategy?
- Ransomware, the Malware that blocks thousands of companies annually
- Security and telecommuting
- How to avoid being a target of Phishing?
- INCIBE - Backup copies and secure deletion
- INCIBE - Passwords and complementary measures
- INCIBE - The workplace and protection measures
- INCIBE - The workplace and protection measures II
- INCIBE - Mobile devices and teleworking
- INCIBE - Safety in teleworking
- Tranxfer and integration with Microsoft Teams
- TRANXFER - Traceability Module
What is your level of awareness?
Check if you master the essential concepts of cybersecurity
other pills
Pill 1 - What is cybersecurity?
Find out how to send and receive files without leaking unwanted information to third parties.
Pill 2 - The most common cyber attacks
What are the most common cyber attacks and how to avoid them in our daily routine.