Mitel MiVoice Connect End of Life is Here
**This article has been updated on 10/10/2024 to include new information and dates provided by Mitel. The end isn't just near; it's here. Mitel...
Learn about our company and our
customer-first philosophy
Put a face to the name and learn
more about our team
Get in touch to learn more about
our partner services
We specialize in a variety of industries, which enables us to offer unique insights
Read the latest and greatest about what
we've been up to
Join our newsletter to get our
latest resources delivered to your inbox
See how we’ve helped businesses
improve their communications
See the latest rankings and reports
for the Gartner Magic Quadrant in
UCaaS and CCaaS
Visit our growing library of resources about cloud and the customer journey
Enjoy reading our frequent articles
written by us for you
If you've missed a recent webinar or event, no problem, access them here
We'll make sure you receive our recent
posts and resources directly to your inbox
4 min read
Admin
:
October 6, 2020
Working from home is becoming increasingly common, unfortunately, so are cyber-attacks.
Security is probably the biggest challenge for IT admins in this regard. Even in normal times (if we recall what that is), it’s common for employees or third parties to log into a company’s IT resources from a remote location. The challenge is multiplied because of the increased exposure to potential cyber intrusion when outside the office.
Cyber-attacks are on the rise. For instance, Infosecurity Magazine highlights a report from Barracuda Networks that email phishing attacks have risen from 1188 in February 2020 to more than 9116 in March. Cyber criminals are taking advantage of the WFH trend. What’s an IT admin to do?
Anyone who connects to the internet may become the target of a cyber attacker. Closed local area networks within the safe confines of the business campus may give a false sense of security, but there are no guarantees. If unprotected, those who have adopted the work from home (WFH) model can be easy pickings for the crafty hacker.
We mentioned the phishing attacks in an earlier post. Links and attachments in emails are an easy way to solicit sensitive information or unleash dangerous viruses. Hackers can launch man-in-the-middle attacks through any unsecure Wi-fi, whether at home or at the coffee shop. Unprotected passwords make a user easy prey for any cyber-criminal with a widely available network protocol analyzer tool like Wireshark.
Other common cyber threats include malware, denial of service, and SQL injection. For information about web application security attacks, have a look at the Open Web Application Security Project (OWASP) Top Ten List.
The first tool in the IT admin’s arsenal to combat attacks on remote access users is simple: education. Every WFH employee needs to be aware of the potential for cyber-attacks and how to prevent them.
IT departments should have adequate documentation that describes best practices for security and includes contact information on how to get help in time of trouble. The at-home user should take personal responsibility to secure any IT resources or company data in his possession.
It may seem too obvious to mention, but physical security of any devices used for business purposes is essential. That means employees not leaving their laptop or smart phone unattended in a public venue, even when going to the restroom.
Curious children in the home may want to see what mommy or daddy does, but leaving company files in plain view could result in the accidental loss of data. Oops! A password-secured screen saver could do the trick. If you use personal devices for business, the same physical precautions apply.
It may not be enough to devise a strong password. If you really want to protect access to your applications, it’s a good idea to implement two-factor authentication. You can verify your identity to the computing environment in three ways:
Something you have
Something you know
Something you are
A password is something you know. Many companies now require the input of a short code that is sent to the user’s smartphone (something they have). You can even go so far as to require biometric authentication such as a thumbprint or an iris scan. Using more than one authentication method offers the user a tactical advantage over the hacker.
All-important data should be regularly backed up. It’s the responsibility of the IT admin to make sure that there is a backup system in place. That could mean syncing files on a user’s laptop with a company server. Some businesses may be happy to take advantage of free cloud services like Google Drive, with files syncing to the laptop.
Another great option for backing up valuable data would be with Microsoft 365’s OneDrive, especially if your organization has already grown accustom to other Microsoft products like Word and PowerPoint. As a Microsoft partner we can help find a data backup solution that would best work for your needs.
Whatever the solution, you should never have just one copy of anything. It’s too risky. Hard drives fail. Files get lost or corrupted. And cyber criminals can wreak havoc with stored data at any time.
Internet browsers and web applications are notoriously vulnerable to security breaches. That’s why Microsoft and other vendors are continually issuing new security patches on software of all kinds. Be sure that all users have the latest, safest software on all their devices. And while you’re at it, keep up on firmware updates too. That’s another possible target for attack.
All users should be connecting to the internet through a secure connection. Commercially available virtual private network (VPN) software is available from a variety of sources. And there are simple off-the-shelf versions that work just as well.
The IT admin should do his homework to find the best solution, but don’t neglect this important aspect of remote access security. It’s especially important when users log in from public places like restaurants, cafes, and airports.
There’s a whole discipline that applies to information technology and other areas that focuses on how to keep a business going when everything goes wrong. Business continuity (BC) is often associated with disaster recovery (DR), but it also applies to problems related to cyber-attacks.
Whether targeted or company-wide, incidents of cyber-crime can make it impossible for users to work. With proper backup, redundant systems and data centers, and a fully developed business continuity plan that also includes voice and collaboration tools, users can rest assured that they can continue their tasks uninterrupted.
Advances in technology continue to make working from home easier and more user-friendly. But neglecting the security aspects of remote access can result in unimaginable loss to businesses, and possibly career problems for those involved.
It’s up to IT professionals to help and advise remote workers on best practices in network security. Someone needs to take ownership of this issue in every company. And every user should accept responsibility for security for themselves. Cyber attackers are working round the clock, and we all need to be on our toes.
If you’d like to learn about our IT professional services and network consulting, please contact us here.
If you enjoyed this article you may also enjoy:
**This article has been updated on 10/10/2024 to include new information and dates provided by Mitel. The end isn't just near; it's here. Mitel...
Genesys and8x8are working together to create a product integration that combines the power of 8x8 Work and Genesys Cloud CX. It enables the premier
These days, themodern contact centerand Bluetooth headsets go together like oil and water; they will rarely be 100% compatible.
Cloud solutionslike those provided by Microsoft Azure offer significant benefits to those who work from home. Perhaps most obvious is the way that...
Law firms used to have an undeserved reputation for being slow to adopt new technology. Many felt there was a lack of desire and motivation to change...
You may enjoy an occasional day of fishing on the lake, but the phishing we’re talking about today isn’t nearly as fun. Similar to regular fishing,...