Work, shop, learn, teach, etc, is the new online norm, and learning to have a work-life balance has been added to our list of “to-do’s.” We read about Microsoft Teams addition of about 12 million daily active users in a single week amid the corona virus crisis, about a month ago. Following, online cyber threats has become the biggest talking point today. A single security breach could lead to data loss, unplanned downtime, and damage to both a business and their client’s reputation.

There are numerous trends taking place as a consequence of threats, which has only continued to increase the need for the tightest possible cyber-security. Not only are businesses taking on the task of BYOD, individual consumers are catching on too. Bring your own device (BYOD) refers to using personal devices to connect to organization networks and access work-related systems and potentially sensitive or confidential data. The purpose of this policy is to address vulnerabilities associated with staff working remotely. The goal of this policy is to provide a safe and functional work environment that will allow staff to work remotely. A focus of concern with remote work is staff-owned devices (laptops, PCs, smartphones, etc.) entering your network, as these devices may not have the same controls as company-owned devices, and if compromised, could infect your data network.

As a consumer these same concepts can apply. What if your personal device is lost or stolen? Such an outcome could pose a serious security risk, particularly if a  data thief gain access to your delicate information. For example, devices may be linked to a credit card – for the purpose of booking an Uber or apps that save your data for easier processing – which could then be compromised. Whether a small business, or a consumer, we have an app for that so to speak.

Meanwhile, with millions working from home for many weeks now, there has been a spike in the video conferencing and online collaboration software, many of which are fortunately entirely free, allowing organizations to integrate them with their internal apps for better performance. In a prior blog post we discussed how technology has helped create options for people to stay connected through less than ideal conditions. Working from home can initially be a bit of the challenge. But it’s also true that many organizations that have previously been reluctant to adopt remote working as a practice have now had little option but to embrace it. As a result, many organizations have already started planning to incorporate flexible and remote working models into their schedules on a more permanent basis—even after the Covid-19 crisis is over.

While relatively not long ago, AV and firewall covered most of the standard organization’s cyber-security needs, today no security posture can be considered complete without a certain level of incident response capabilities, alert prioritization, root cause analysis and forensic investigation – and security professional that are sufficiently qualified in this domain both are hard to find as well as costly to retain. As cyber-attacks continue to increase in volume and in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose from. Whether your company now has a remote work environment or if you’re thinking about pulling the trigger, we can help…

We all here about malicious activity daily, and CEO of EasyJet said it perfectly this week. “We take the cyber-security of our systems very seriously and have robust security measures in place to protect our customers’ personal information. However, this is an evolving threat as cyber attackers get ever more sophisticated,” says EasyJet Chief Executive Officer Johan Lundgren.

Affected customers should be suspicious of phishing emails, which are usually the next step of cyber-criminals to trick users into giving away further details of their accounts like passwords and banking information. Don’t fall for these scams. Training and testing can help to get most people up to speed quickly to defend against the dangers posed by emails, links, maps, PDFs, info graphics, and other infection vectors.

ManagedTEK is utilizing this time to continue to help our customers, and friends, be as productive as possible while focusing on our goal of providing the most efficient tools to navigate safely in this immense digital world. No one can predict the future and as technology advances, we all need to stay afloat. Is your business future ready? Download our latest White Paper to see how businesses in your region held up against the continued rise of data breaches and cyber-crime. Learn how to find out if your sensitive data is for sale on the Dark Web and what steps you can take to stay one step ahead.

Here at ManagedTEK we strive to provide top security solutions. When in doubt, always call the person who supposedly sent info on the phone to verify it’s legitimate. Of course, if you have an immediate IT need, you can always reach us at 707.205.3727.

Want more tips? Follow us to learn more about IT security solutions and monitoring. We can help you design a solution to meet your need. Change the way you view your security by strengthening through training. We can make technology simple by designing a solution to meet your need. CISA (Cybersecurity and Infrastructure Security Agency) encourages users and administrators to review the Microsoft Security Advisory and Microsoft Customer Guidance for CVE-2019-0708.