[ad_1]
Whether working in the office, remotely or on the go, experts share ways people can protect their workplaces
Hybrid work environments have become an integral part of businesses in the UAE and globally, especially as travel restrictions ease and more employees feel comfortable traveling and working remotely.
This also brings rising complexity and security risks.
Today, the rise of cyberattacks poses a growing threat to the workplace being redefined by remote capabilities. Whether teams are working in the office, remotely, or on the go, Cisco experts share important tips users can implement to ensure a smooth hybrid work experience.
Fady Younes, Director of EMEA Service Provider and MEA Cybersecurity, said: “As work patterns change and hybrid work becomes the norm, traditional workplace concepts with their rules and hierarchies are being replaced by a more flexible approach based on hybrid work. However, we must never forget that this growth and flexible way of working is underpinned by maintaining the security of the data and the systems that process it.”
He added: “Employees working remotely must be aware of their responsibility to follow good cybersecurity practices. With the freedom and power of hybrid work, wherever we are, we need to work in a cybersecurity manner.”
Fadiyounis
To increase security awareness and ensure a safe and seamless user experience, Cisco highlights several key steps users can take to protect against potential cyberattacks and threats.
— Make sure to use strong passwords
The most common passwords in 2022 still include 123456, QWERTY, passwords, and more. Create unique passwords for each account using various capitalization and symbols, and change them annually.
— Take advantage of two-factor authentication
Two-factor authentication (2FA) adds a layer of security that’s easy for users while making it harder for anyone who shouldn’t have access to private data. 2FA technology means users have the opportunity to spot malicious misuse of their credentials, and administrators have metadata from user confirmations, so unusual access times or locations can be seen.
— Be smart about how your equipment is used
How a device is used can affect its vulnerability to cyberattacks. PINs and passwords must not be associated with important dates or other information, and applications should only be installed from trusted sources. Another key tip is to make sure the device software is up to date.
— Watch out for scam calls
Watch out for scam calls and emails, especially those asking for money transfers to purportedly support people in distress. On the other hand, today’s phishing emails can be very convincing. The key to identifying these scams is to pay attention to odd wording, email addresses, odd links, companies with generic addresses, and more. Remote work may also open up channels for calls that might have a story and being asked to download or authorize certain content from a smartphone. In these cases, be sure to notify the IT department.
— Regularly update endpoint protection
Endpoint protection is critical to detecting and eliminating malware. For complete security, it is recommended to use the latest endpoint protection with the latest signatures installed.
Also read:
ismail@khaleejtimes.com
[ad_2]
Source link