Your remote teams face an increased susceptibility to encountering information and cybersecurity threats. There are a number of reasons for this including:
Your remote teams face an increased susceptibility to encountering information and cybersecurity threats. There are a number of reasons for this including:
- Remote working employees are more likely to share their devices with family members or other housemates. This increases the risk of data breaches and other information security incidents.
- Because of the physical and mental distance between remote employees and their technical or security teams, they are less likely to report IT security incidents.
- Remote working teams are more likely to be using unsecured access points or routers. This can lead to increased exposure to attacks such as Wi-Fi snooping, router DNS or ARP poisoning attacks.
- Remote working employees are more likely to use “shadow IT”. Unapproved devices and cloud services increase the risk of a data breach or cyber attack.
- Device theft or loss is much more likely for remote workers. Computing devices can get stolen from cars or inadvertently left public venues such as cafés or on public transport.
Who should attend:
Any employee or third-party contractor user who uses their own computing devices for handling, processing or storing your organisation's data.
Instruction:
On-site instructor-led sessions, web conference (such as Zoom and Teams) and customised e-learning.
Facilitated by:
Workshops, videos, scenario-based learning, email briefings, posters and gamified knowledge assessment.
Strategic Purpose:
To lower the risk of a data breach or other IT security-related incident caused by employees who work remotely full or part-time.
Some benefits of our Secure Remote Working module. After this training, your employees...
- Will gain a solid understanding of how cyber criminals exploit remote workers. For example, how the lack of immediate support and lack of information about the latest threats can be easily exploited.
- Will understand the limitations of technical controls in remote environments and the pivotal role they play in keeping your organisation secure.
- Will understand how social engineering scams such as pre-texting and TOAD attacks are targeted towards remote employees. Your team will be given actionable advice on how to spot and mitigate such attacks.
- Be educated on remote working information security risks such as device sharing and device theft.
- Be educated on the importance of device encryption when working remotely.
- Be educated on the risks of poorly secured wireless networks.
- Be educated on the risks of storing data on personal devices or cloud services.
- Will understand how cyber criminals can spoof invitations for video conferencing tools such as Microsoft Teams and Zoom.
- Will understand how cyber criminals use techniques such as SEO poisoning and malvertising campaigns to spoof remote access VPN applications.
- Will be armed with actionable advice on how to spot and mitigate information and cyber security threats whilst remote working.
- Will understand the important and pivotal role they play in timely incident reporting.
This Secure Remote Working module can be customised to industry sector or according to job role.