Data Telcom is a broker of new and proven, fully tested, quality refurbished IT infrastructure hardware

We sell and buy back IT infrastructure equipment

Protecting teleworkers against hackers

Knowledge is power!

Protecting teleworkers is also an integral part of cybersecurity.

Protecting teleworkers against hackers

Continue reading as knowing is truly key, to making more informed decisions

Teleworkers need to be protected!

The need to protect teleworkers CANNOT be overstated?

All employers have a responsibility to provide a safe and secure working environment for their employees.

The same goes for protecting teleworkers against cyberthreats in these turbulent times we live in right now.

And let’s face it, it goes without saying that, it is to the benefit of all employers to do so.

Protecting teleworkers is also an integral part of cybersecurity.
More and more people are working remotely. When implementing cybersecurity solutions, you also need to plan for the protection of those teleworkers.
In the age of the Covid-19 pandemic, for many of us, teleworking has become the norm.

The COVID-19 pandemic has changed the world for everyone​

It's even more so when it comes to office workers. Many of whom are now, and for the foreseeable future, working from home.

Although working from home as it's benefits such as being able to sleep a little longer, dressing casually, enjoying homemade lunches and not being stuck in traffic for hours, just to name a few, it also presents IT managers with challenges. One of which being cybersecurity.

Teleworking during the pandemic

Why is cybersecurity a concern?

Hackers are smart!

We need to protect ourselves against them!

Cyberthreats are real and, we must all know how to protect ourselves and our sensitive data against hackers!
Hackers are constantly innovating and creating new ways to attack unsuspecting and often ill protected users. Therefore, it's important to know what we're up against and what to do to protect ourselves against those cyberthreats.

Although there are companies that provide their employees with computers (mainly laptops), many telecommuters use their personal systems.

And even if your employees do use systems that were provided by their employer, who’s to say they don’t use those same systems for personal things?

Therein lies the problem for IT professionals!

These days, everyone is glued to the news and / or surfing the web to find out what’s happening, what governments are doing to help their citizens and, what are the latest rules and regulations to follow in order to stay safe.

Hackers are smart! They know that and are taking full advantage of it!

Every time you visit a site and fill-out some information requested in an on-line form, there’s a chance hackers can get all or parts of that information. The easiest of which is email addresses.

But that’s only one example. As it stands, there’s a new scam based on the COVID-19 crisis popping up daily

Unsolicited emails are often scams that contain malware. Malware is definitely a serious cyberthreat.
Email scams are nothing new. However, in the age of the pandemic, they are more prevalent then ever. Since the scams often contain malware, IT managers must educate and protect users against those as they can be a very serious cyberthreat.

Beware of unsolicited emails (i.e.: email scams)

One that’s very popular with hackers these days is impersonating legitimate bodies, such as governments as well as health and safety organizations like the UN’s World Health Organization (WHO), the US’ Center for Disease Control and Prevention (CDC), Canada’s Public Health Agency and many others, in order to gain users’ trust and get them to open malicious emails.

And even though many governments and organizations have issued warnings, many people still fall prey to these scams.

Working from home gives you more time to relax and sometimes, that time is used to surf the net, catch up on work and personal emails. Whether you’re using your personal computer or one that was supplied by your employer, always be careful when receiving unsolicited emails.

Unsolicited emails often come from hackers looking to gain your trust and reveal private information about yourself as well as infect your systems and home network with malware!

Whether you’re using your personal system or one that was provided to you by your employer, when connecting that system to your own personal resources such as a home network, this is something no IT professional can control. It’s your responsibility to exercise caution as you’re the only one with full control over those resources!

If one of your home systems gets infected, it’s only a matter of time before the rest are.

To make matters worse, if you remotely access your company’s system, depending on the IT security measures your employer has in place, there’s a chance  you can infect those as well! If that happens, the repercussions can be quite severe!

Consequences of opening unsolicited emails

Here are a couple examples of dangerous unsolicited emails. Can you spot the problems?

Clicking on links found in unsolicited emails is a typical type of phishing scam.
More often than not, clicking on links found in unsolicited emails means you've just fallen prey to a phishing scam! Where you reveal confidential details, which cybercriminals can then use to steal information and/or launch attacks.
Email scams often contain attachments. Opening those attachments can infect your system with viruses and malware.
Attachments in unsolicited emails often contain malicious code that will infect your system! IT managers need to educate users about both cybersecurity and cyberthreats. The more knowledgeable users are, the less likely they are to fall prey to email scams and have their systems infected with malicious code.

The types of attacks shown in the above images can have serious consequences such as:

  • Infecting the device you opened the email on with malware and spreading it throughout your other devices ( local and remote) on the network.
  • Stealing login credentials by way of phishing sites or other phishing methods.
  • Collecting private information such as credit card details, through donations done on a fake charity website.

Hackers often use impersonation tactics to trick users into thinking their emails are legitimate. These tactics include malicious links in the body of the email and / or malicious attachments.

  • When clicking on those links your often sent to a website where you’re prompted to enter personal information hackers will collect.
  • When opening the attachment, malware is installed on your computer or other device being used.
    • Malware that can than spread to all other connected devices.
Users unaware of cyberthreats are likely to become the victims of phishing and other types of cyberattacks.

Teleworkers at risk of falling prey to phishing attacks!​

When working at the office, IT security mechanisms and resources are in place to protect the company's assets against hacking attempts.

When working remotely from home, the same is not always true!

Just like office workers, remote workers need to be protected against cyberattacks.

Protecting all employees from cyberthreats

Protecting employees CANNOT be limited to ONLY when they are in the office!

Protecting teleworkers from hackers, phishing scams and other types of cyberattacks is just as important as protecting office workers.

When working from home, users are more likely to open emails they believe come from a legitimate source.

This is why protecting teleworkers from the various and ever-present cyberthreats is a must!

Mitigating the threat level

What can employers do to manage and mitigate the threat level email scams can cause?

Be it for office workers or teleworkers, it all starts with education. Educate your employees on cybersecurity and cyberthreats.

This is especially needed in these chaotic times we currently live in and, in the long run, this will help protect both your employees and your corporate assets.

Educating workers on cybersecurity is essential!

Say and repeat often!
Say to your employees and repeat as often as needed:
  • Don’t click on any links found in emails coming from sources you don’t know, as these links can send you to malicious websites.
  • Be wary of any emails coming in from governmental health and safety agencies. Instead, go directly to these organizations’ websites for the latest information.
  • If you receive emails from co-workers or company executives updating you on things, double-check their emails to make sure it’s really coming from them. Better yet, pick up the phone and call them directly to confirm they are indeed the ones who sent the email.
  • Never give out any personal information, login credential or make any payments in response to an email.
  •  All email scams received on your work address should be reported to the IT management. If it comes in on your personal address, classify them as spam and add the email address to your blacklist.
  • Remind your employees to have up-to-date and reliable antivirus, anti-phishing and anti-malware software, installed on their devices.
    • If the computer you use to work remotely is provided from the company, your employer’s IT department can provide those
  •  Make sure that upon them becoming available, all security updates, upgrades and patches are immediately installed
Those are standard things that apply whether you’re using your own personal system to work from home or systems provided by the employer.

Protect your data and employees from cybercriminals

Put IT security infrastructures in place

As previously mentioned, the above applies whether you’re using your own personal devices or systems provided by your employers.

It doesn’t stop there, however. For companies to protect their teleworkers, the following is also  highly recommended

  • Have content filtering security solutions in place to filter malicious emails, inappropriate content and malicious websites.
  • Having a local backup solution in place, complemented by cloud backup services.
  • Have a VPN solution in place and provide VPN clients to the employees, so your remote workers can securely connect to the corporate network and securely communicate as well as exchange files and data safely.
Peace of mind comes from knowing you've done all you can.
Knowing that you’ve done everything you can to make sure your users and data are safe and secure, gives you peace of mind and enables you to rest easy.

In conclusion

In doing all this, everything and everyone is protected and productive. Two things that are very much needed when working from home in these turbulent times we’re in
Related posts
Protecting digital assets and protecting against hackers in general are key aspects of cybersecurity.

Protecting ourselves against hackers

Doesn't matter if you're an individual, a government or a corporation, protecting ...
The importance of data security cannot be overstated.

The importance of data security

Data security must be a priority for all as cybercriminals are becoming ...
Featured posts
Top 6 reason to buy refurbished IT hardware are availability, cost, performance, reliability, ROI, reducing electronic waste
Information technologies

Top 6 reasons to buy refurbished IT hardware

Find out what are the top 6 reasons to buy refurbished IT ...
The chip shortage is causing supply chain issues for the IT industry, as well as lost revenues for many.
Information technologies

Refurbished can solve IT supply chain issues

Deliveries of new IT hardware products are weeks, even months behind schedule? ...
Local data storage still plays an important role.
Data Storage

Local data storage is still very important

More and more businesses are using cloud services and, storage is one ...
Protecting digital assets and protecting against hackers in general are key aspects of cybersecurity.

Protecting ourselves against hackers

Doesn't matter if you're an individual, a government or a corporation, protecting ...
Just like with any network, an internet network outage can sometimes occur.
Questions and answers

Internet network outage - What to do next?

An internet network outage may not be a major catastrophe but, for ...
The importance of data security cannot be overstated.

The importance of data security

Data security must be a priority for all as cybercriminals are becoming ...
Because data is growing at an exponential rate, the importance of data storage and backups cannot be overstated!
Data Storage

The importance of data storage

The importance of data storage CANNOT be overstated. It is CRITICAL to ...
Local and cloud computing are two technologies that complement each other.
Information technologies

Differences: Local and cloud computing

Local and cloud computing complement each other! Local computing is key to ...
Buying refurbished is good business as it enables you to save money!
Questions and answers

Cut costs! Buying refurbished is good business

Buying refurbished hardware makes good business sense. It means lower capital expenses ...
Sell your old IT hardware that's no longer being used. Turn those products into a revenue stream.
IT asset disposal

Get some money back! Sell your old IT hardware

Get some money back! Your old IT hardware that is no longer ...