Cyber Threats your Remote Workforce Face and the Best Cybersecurity Practices to Follow

Cyber Threats your Remote Workforce Face and the Best Cybersecurity Practices to Follow

Cybersecurity has always been a concern for most companies. Fast forward to today, businesses have to learn how to manage a distributed workforce in a short amount of time.

While those who have had a remote workforce or have distant assistants working for them might be doing well, most businesses are experiencing this for the first time.

Having a distributed work environment opens the door for cyber threats and the risks associated with it. 

In a recent Live with Bottleneck podcast, Morgan Wright discussed the topic of cyber threats and cybersecurity. For those who are unfamiliar with his work, Morgan Wright is an internationally-recognized expert on Cybersecurity strategy, Cyberterrorism, identity theft, and privacy. He was also a Senior Advisor in the US State Department Anti-Terrorism Assistance Program and Senior Law Enforcement Advisor for the 2012 Republican National Convention.

In addition to 18 years in state and local law enforcement, Morgan has developed cybersecurity solutions for the largest technology companies in the world.  

Here are some of the points about cybersecurity that he had raised and how you and your business can avoid such threats.


Cybersecurity Risks in the New Normal

Most of these cyber threats have long been a thorn to businesses and enterprises that depend on the web. With the shift to remote work, another level of vulnerability has joined the mix. To make sure you know exactly what to look out for, here are some of the concerns of having a distributed workforce:


Network Hacking and Data Breach

Protecting company data is one of the most crucial aspects of cybersecurity. If your business deals with information about your client, the stakes get even higher.

It can result in lost man hours and important data for both you and the client. But most importantly, it can lead to a loss of trust from current and potential clients. 

Having a distributed workforce means taking different measures for security. It would be ideal for companies to provide a remote device that their employees can work from.

Dedicated devices make it easier to prevent unauthorized access to your network.

If your remote workforce needs to work on their personal devices, there are other options available. Companies could also avail of Remote Desktop Services that have Multifactor Authentication.

This allows employees to access a virtual desktop remotely on their device. This not only offers control of the data flow but can also connect you with your employees in an internal network.


Phishing Scams, Impersonations, and Fraud


Phishing

Most people are familiar with online phishing scams by now. Who has not received an email that says they have won money on a raffle, or a certain prince who wants to give them money?

Unfortunately, phishing attacks are becoming more prevalent, particularly in businesses. Hackers would pretend to be employees and send emails with malicious links in them.

And all it takes is one employee to click that link for them to gain access into the network and steal data. They can then use that employee’s account to send out more of the phishing emails to get higher levels of access. In this case, no amount of cybersecurity can help if the problem is the user itself.


Impersonators


Some will straight-up impersonate the CEO or owner of the company and email their distant assistant to send them sensitive information, or request funds to be transferred. These ones are easy to catch if one is wary, but it can still slip through the cracks if one isn’t paying attention.


Scams

A type of scam that has devastating effects is Ransomware. It is pretty much the same as phishing scams: you get an email with a link or a file that has malware.

The difference is rather than stealing your data, it will lock you out of your device and take your data hostage. They will then contact you for a “ransom”, so you can gain access to your files again. This one is particularly nasty, as it often leads to loss of valuable data, regardless if you ransom it or not. 

Ultimately, the best course of action against ransomware is to be vigilant. Never click links that you see in emails, and always check the sender of the email. If it is someone you know, ask them if they sent that email, and inform them of the breach if that was not the case.


Videoconference Hijacking

This last one is a recent issue that has blown up due to the increased need for video conferencing for work. It came to light in the recent boom of the video conferencing tool, Zoom.

Zoom has been a helpful tool for remote workforces and distant assistants who need to communicate with their clients. But with the sudden increase of users, cybersecurity flaws have started to emerge.

Since you only need a link to connect to a meeting, it has been plagued with disruptive people. Another issue is if that gatecrasher happened to hear internal company information. While the latter is unlikely, it is still a possibility. 

If you have to use Zoom for meetings that involve company information, use a meeting link that only a few people know. Better yet, add a passcode to your meeting link for added protection


Steps you can take to prevent cyber threats and beef up your Cybersecurity at work

Morgan Wright brings up an interesting point about Cybersecurity: sometimes, just following the basics can shield you from most cyber threats out there. That said, here are some tips and advice you can follow to avoid such risks when working remotely:


Have Separate Devices for Personal and Office Use

Using a personal device for work can be risky. More so if your tasks require access to sensitive client or company data. It is ideal to have a separate device for work. And if your company issues a remote device for you, make sure not to use it outside of work. The less contact it has to possible threats, the better. 

Another thing you can do is have a dedicated network for work in your router. A dedicated network not only helps with security, but you also have fewer devices to compete with for the bandwidth. 

Encrypt your Data in Motion – use VPNs 

If you have to work on a public network, it is important to encrypt the data that you are sending out. Using a VPN to encrypt your data as it comes out of your device will deter most of the risks of using a public network. It can protect your data from malicious people or software that may be lurking in that network. 

But if you are at home, you may not need to use VPN all the time. If you are confident that your network is secure, using VPN is redundant. Most websites, banking apps, and cloud storage nowadays have security protocols in them.

Using VPN might result in a response delay as both ends are encrypting and decrypting at the same time. It is only when you are using it in a public space that you need extra protection. 


The Myth of Changing Passwords

Most security professionals would recommend changing your passwords every 30 or 60 days. Some companies even make it mandatory by having your password expire after. But is it really a good idea to do it so often?

According to the National Institute of Standards and Technology (NIST), it isn’t. Changing your password often does not necessarily equate to better security. And if you are someone who uses a lot of tools that need access, you end up having to remember too many passwords at once.

This can lead to people writing them down, oversimplifying it, and other bad password behaviors. 

“By the way, this fiction of having to change your passwords every 30 days, the only thing it does is ensure that the next password is weaker than the previous one and then the next password after that one is weaker than the previous two.”
– Morgan Wright

So when should you change your password? Here are some of the instances where you should definitely change your password.

  • You have reason to believe that there was unauthorized access to your account. 
  • There is evidence of malware in your device or a device that you used before.
  • If a website or service you use had a recent security issue.
  • You shared access to an account with someone else and they no longer use the login. 
  • You logged in on a shared or public computer. 
  • It has been a year or more since you last changed the password.

Having trouble keeping track of all your accounts and passwords? Use password management apps like LastPass.com. You won’t have to worry about using it in public spaces, as it provides an encrypted password for you.

You can also use it to share access to a dedicated distant assistant but still maintain control of the level and duration of access they have. 


Be Vigilant

Last but not least, you should be vigilant at all times. All the security features don’t mean anything if you are the root cause of the problem. Those malware and viruses do not just install themselves. It needs someone careless enough to click a link or open a malicious file for it to happen.

So if you get a suspicious email from someone, it is best not to click any links or files in the email. Check who sent it, and if it is someone you know, confirm it with them. You might even end up alerting that person that they have a compromised account.

If you are working with a distant assistant, you need to find a secure way to transfer data to avoid possible leaks. You must also remind them not to access any suspicious websites.

Lastly, they should alert you if they receive any suspicious email or messages from “you.” Remember, you are only as strong as your weakest link.

There are a lot of cyber threats out there, and it is understandable why some companies are reluctant to go remote because of these risks. But by following these basic tips, you can make a secure workplace for yourself at home or in your remote office space.

Cyber Threats your Business Face during Remote Work and the Best Cybersecurity Practices to Follow
“You will become a much harder target. Think of it this way, you’re walking down the street and you see a house that has the front door open, the windows are open, the garage door is open and the car is not there. Obviously, somebody is not home.

What you want to do is you want to harden the target a little bit. Close the doors, close your blinds, close your windows.”
– Morgan Wright

Conclusion

Have you been a victim of these threats? Let us know how you resolved it and what you have learned from it in the comments below! You can also reach us on Facebook and Twitter if you have questions on how to secure your remote workforce. 

Hear more from business experts and entrepreneurs! Check out Live with Bottleneck for more information on how to take your business to the next level!


Want to learn more on how you can coordinate with your distant assistant in securing your business from cyber threats?

You can also subscribe to our newsletter so you can receive up-to-date information about other tips on how our Distant Assistants can help entrepreneurs grow their business. You also get FREE access to our Ultimate Distant Assistant Checklist when you sign up.

Jaime Jay

About Jaime Jay

Meet Jaime Jay – a man who wears many hats, and wears them all admirably. He's a master connector, an entrepreneur extraordinaire, and a published author who knows how to get things done.

Before he found his way to the business world, Jaime served his country as a brave paratrooper in the U.S. Army. But that's just the beginning of his many accomplishments.

He's the founder of the renowned Bottleneck Distant Assistant Services firm, and his book "Quit Repeating Yourself" has become a must-read for entrepreneurs everywhere.

When he's not busy building his empire, you can find him on his beloved Harley Davidson, cruising through the countryside and taking in the invigorating effects of Uitwaaien – a Dutch practice that involves facing the wind to boost health and relieve stress.

He enjoys spending his free time outside building stuff with his wife, Nikita the dog and their two kittens (for now at least) Tommy and Tater.

He is ‘over-the-moon’ happily married to his wonderful wife Sara, his amazing daughter, Jessica, who is serving our country as a United States Army soldier. Jaime and Sara are the proud grand parents of two beautiful little girls.

Victoria Dorsano
Victoria Dorsano
2023-09-17
Bottleneck has been such an amazing support for my business! They have a seamless process to ensure you find the right fit for your DDA. I am so thankful I started working with them! I'm now able to accomplish so much more in my business with a personal DDA and editing team on my side. Thank you!!
Rockwell Felder
Rockwell Felder
2023-03-15
I cannot thank the team at Bottleneck enough for their incredible support of our business. Their team has played a vital role in helping us staff our customer support and ensuring our customers were satisfied with our services. Their Distant Assistants were extremely helpful in answering inquiries promptly, handling complaints, and providing solutions to our customers' needs. Their professionalism, attention to detail, and communication skills are exceptional. Working with Bottleneck has been a fantastic experience, and I highly recommend their services to anyone needing a reliable and efficient virtual assistant, especially for customer support.
Karen Ravano
Karen Ravano
2022-09-24
I am grateful and blessed to be part of this team. It’s such a wonderful experience because i gain more experience and help me enhance my basic skills. This will be my stepping stone to my career as a newbie in this kind of industry. It would help to reach my goals.
Jeany Mercadal
Jeany Mercadal
2022-09-16
Bottleneck Distant Assistants can lessen the burden of company owners. We provide excellent services depending on our client needs. We are not scam, clients surely get more than what they pay for. Being part of this team helped me hone my skills and become excellent in all my works.
Jeff Peñaflor
Jeff Peñaflor
2022-09-14
I started last March 24, 2021 as a Dedicated Distant Assistant and it was an awesome experience. In this new journey, as Security Administrator of Bottleneck Distant Assistants, I have been supported by the team, A LOT !!!! All help that I need, the whole team is there to support me. I know that there are a lot of room for improvements with my skills and what I know, but because of BNDA, I became equipped with all the weapons I need to conquer the daily challenges especially with my tasks. With BNDA, they will not just help you to aim high, but soar the skies!
Tinoe D
Tinoe D
2022-09-09
I don't remember the last time I loved what I was doing until Bottleneck came into the picture. I love working for bottleneck, they are professional. The management makes the workplace fun and they're very flexible. I definetly recommend that you make that important switch and be part of something big today by joining BNDA.
Michael Goodcliffe
Michael Goodcliffe
2022-09-09
Jaime and his team are incredible at what they do! Joining them has been one of the best decisions in my life! I whole heartedly recommend them to anyone who are looking to scale and improve their business. Their highly 'Dedicated Distant Assistants' are well trained. They are top notch!
GM Simon
GM Simon
2022-09-08
Working with Bottleneck is not just having one or two assistants working alongside you. You have the support of the whole team behind them as well.
Ma. Edeliza Silot
Ma. Edeliza Silot
2022-09-07
Aside from the knowledge gained, the trainers are highly commendable.
Sara Knox
Sara Knox
2022-09-07
What an awesome business! Finally, a way to hire the RIGHT person for my administrative tasks and they are remote! No office space to consider, W2's, 1099's or payroll. Jaime and his team of remote workers are top-notch! I hired my first assistant in May. I recently suffered a motorcycle accident and it left me unable to work for 2 weeks. But my assistant stepped right in to guide our CEO on all matters financial. It’s so nice to have that stress eliminated from my life!
book-a-time

Get Your Book Now!

Quit Repeating Yourself provides guidance for entrepreneurs, business leaders, and managers to help prevent unknown challenges from ruining their business.

Subscribe to our Newsletter

Related Blogs

Collaborate with Virtual Assistants

Collaborate with Virtual Assistants

Virtual Assistants as the Backbone of Business Success

Supporting Your Vision: Virtual Assistants as the Backbone of Business Success

Unlock-Efficiency-and-Growth-with-Highly-Skilled-Virtual-Assistants-Across-Multiple-Domains

Focus on Your Core Business: Free up Your Time for Important Business Activities by Hiring Bottleneck Distant Assistants!

Elevating-Your-Business-with-Bottleneck-Distant-Assistants

Custom-Tailored Assistance: Elevating Your Business with Bottleneck Distant Assistants

Get-Organized-with-Virtual-Assistants-and-Stay-Ahead-of-the-Game

Stay Organized, Stay Ahead: Get Organized with Virtual Assistants and Stay Ahead of the Game!

Streamline-Your-Operations-with-Virtual-Assistant-Support

Maximize Efficiency: Streamline Your Operations with Virtual Assistant Support!

Take Control of Your Time: Book a Consultation