Today, many companies use personal devices to access corporate data. The main advantages of this approach, which is called BYOD (Bring Your Own Device), are the convenience and flexibility of staff work. In contrast, the reliance on personal devices creates new dangers for corporate data, especially during active cybercriminal attacks.
ESET specialists have prepared a series of tips that will help reduce cyber risks associated with the use of personal devices in corporate networks.
Increase control over staff devices
The use of personal devices by employees without security control poses a serious threat to corporate data of companies. First and foremost, organizations should check all employee devices that have access to their networks. It is also necessary to establish security and configuration standards that employees’ devices must subsequently comply with.
One of the greatest risks to the privacy of corporate data and systems is unauthorized applications or other software on employee devices, which are shadow IT resources.
To prevent uncontrolled unauthorized access to corporate data, organizations can implement control by creating lists of applications that are allowed or prohibited for use.
ESET products will provide multi-layered security for personal devices in corporate networks.
Regularly update software and operating systems.
Regularly installing security updates is important for timely fixing known vulnerabilities that are often exploited by cybercriminals in attacks. To control this process, companies should install device management software, which will not only help with timely device updates but also enhance security levels. It should be noted that the vulnerability and patch management function in operating systems and programs for all workstations is available in ESET solutions.
If keeping the software on devices up to date is the responsibility of the employees themselves, organizations should at least remind them of the available patches and provide instructions on how to apply updates and verify the results.
Establish a secure connection
Remote workers can use not only home Wi-Fi networks but also public ones. In any case, a properly configured virtual private network (VPN) allows employees to access corporate resources and reduces the risks of becoming a victim of cybercriminals.
It is also important to use the Remote Desktop Protocol (RDP) for connecting to the corporate environment. It should be noted that RDP is also a common attack vector due to the transition of a large number of staff to a hybrid work mode. Malefactors continue to attack users by exploiting incorrect RDP settings or weak passwords to access company networks. Cybercriminals can exploit these vulnerabilities to steal corporate files and demand a ransom, trick victims into transferring money to the attackers’ accounts, or damage data backups.
Currently, there are many ways to protect against RDP attacks. In particular, it is necessary to properly configure protocol access by disabling RDP for Internet access and requiring strong and complex passwords for all accounts. For more information on the proper configuration and security of the Remote Desktop Protocol, read the link.
Protect the company’s confidential data.
Storing confidential corporate data on personal devices is particularly dangerous due to the risk of theft or loss. To protect the company’s data, a strong password for protection and automatic locking should be set. Companies should also ensure that employees are trained in the basic security rules for using personal devices on corporate networks. Moreover, organizations should encrypt all confidential data, even during transmission, implement multi-factor authentication, and secure network connections.
Ensure the protection of video conferences
Today, many companies use video conferencing services, which are a convenient way of communication, allowing employees to be in different locations while still being able to address work-related issues. However, organizations should develop guidelines for using video conferencing, such as which software is recommended and how to secure the connection.
Add a Comment