Cybersecurity

How Organisations can Protect their Staff from Phishing, while Working from Home

phishing - cfamedia

The ongoing threat of the coronavirus has forced organisations across the world to rethink their mode of operations and while they work from home protocol has been initiated by many of them.

It sometimes comes with the risk of getting their workers’ online accounts hacked, via phishing and other cybercrimes.

It is highly essential that, as organisations look out for the welfare of their workers, they also need to start paying attention to the online security of their workers, as they work from home.

According to new reports gathered by Google and analyzed by Atlas VPN, in January, Google registered 149k active phishing websites.

In February that number nearly doubled to 293k. In March, though, that number had increased to 522k – a 350% increase since January.

The above statistics, shows that phishing attacks are on the rise, due to the simple fact that, more people are at home using the internet, at a rate that the world has never seen before.

As the number of internet users increases, phishing attacks and other related cybersecurity crimes have, also spiked and now, statistics show that, it is getting higher, every month.

How can organisations, effectively, protect their workers and ensure that their dealings relate to the company’s job online is properly protected?

Below are three, (3), ways online protecting of workers can be achieved:

The Use of VPN

During this period, we have seen the astronomical rise in the use of VPN, by private individuals and different organisations, in their bid to ensure that their online connection is private and secured.

It is essential that MFA for VPN login is, activated, as it ensures maximum protection and cut off the prowling hackers from gaining entry in the network.

Strong Authentication

Having a very strong authentication process goes a long way in ensuring that, users’ network is properly protected and one of the surest options, still remains the multi-factor authentication, (MFA).

It is very crucial that workers have this extra protective layers.

One, however, needs to understand that some software-based multi-factor authentication,  (MFA), methods are still susceptible to phishing and other cybersecurity attacks.

It is, highly, essential that thorough investigation is, carried out, before choosing an MFA that suits the need of your organisation.

Explore the use of Identity Access Management (IAM)

What the Identity Access Management, (IAM), does is, to ensure that you do not input your personal details, (Usernames and Passwords), multiple times to log in to a site.

When you combine a verified MFA to an IAM, the result is massive, as it quickly provides that much-needed thick layers of protection, for an organisation and with just one single point of login, secured access to a range of business applications is, achievable.


Featured Image: brightlineit


Don’t miss important articles during the week. Subscribe to cfamedia weekly digest for updates.