Cyber Risks in the Remote-Work World- New Cyber24 Podcast


Security concept Lock on digital screen, illustration

If you were to guess, who would you say is the most likely target for cyber-attacks: a tech-savvy, in-touch professional, or someone largely unfamiliar with internet technology? Perhaps surprisingly, a recent survey by OpenText found that tech-savvy individuals are more likely to be affected by cyber-attacks. Tyler Moffitt—of OpenText security—explains that cyber-attacks against such people are more likely because they have a much larger online presence, with more accounts and more passwords to keep track of. As employees have moved from in-office to remote work, it has become even harder to manage all of the access points of their tech-savvy employees.

So what can companies and agencies do to keep themselves safe when their employees don’t work in the office on a controlled device? Moffitt suggests purchasing a VPN subscription service and asking employees to use it whenever accessing work data from home. Another necessary step, in his mind, is setting up two factor authentication, ideally one without SMS verification.

These measures probably sound familiar; many portals require or allow two-factor authentication and VPNs have been around for a while. What may be less familiar, but just recommended, are phishing simulations. Listen as Moffitt discusses the everything above, as well as the benefits and best practices of phishing simulation—including examples from the recent Uber breach.

 

 

Episode 170: Cyber Risks in the Remote-Work World

 

Listen to the Podcast

 


 

salto

 

If you are looking for protection from uncontrolled access, SALTO can deliver the perfect solution, tailored to your exact requirements to provide you with all the security, convenience and control you need. With SALTO, you install access control in a wire-free environment, so there is no need to hardwire the building. Because SALTO runs on a virtual network, you can enroll or replace a lost key within seconds, making reprogramming and re-keying a problem of the past.

See how SALTO can make your access control and building security simpler and safer at vlcm.com/salto.

 

Aruba ITX Logo

 

There’s plenty to keep you up at night, but with so many remote workers, iot devices and multipile clouds, it’s hard to balance keeping everyone productive while keeping the network secure. With Aruba’s edge services platform, you- don’t have to choose between delivering network performance or closing security gaps. Learn how Aruba’s SASE and Zero Trust Framework can help you deploy network security services how and where you choose.

Get the facts by visiting vlcm.com/edge.

 


 

About Cyber24

CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable format designed to arm public and private sector leaders with the information they need to protect their organization. 

 

About VLCM Cybersecurity

VLCM’s Cybersecurity Team offers leading industry expertise to design, implement, and support the right cybersecurity solutions. VLCM’S Cybersecurity architects Get IT Right by implementing layered security strategies, and partner with a wide range of industry-leading IT security vendors to develop the best cybersecurity defense for your unique organization. Team up with our experts to be more cyber secure, in control, and home in time for dinner.