Security and Telecommuting

share post

Security and Telecommuting. Union make force.

Although teleworking was already a concept that was beginning to be gradually implemented in companies, in a short time and due to various circumstances, most organizations have been forced to implement this work model. Telecommuting has come into the lives of many workers in an accelerated way to be able to continue business within the framework of digital transformation. It is because of this acceleration that it is vital to put together the concepts of teleworking safely for smooth operation.

We are at a time where digitization is here to stay and even more so now, when circumstances allow it. Many companies have had to quickly adapt to having their all of the staff distributed and that the employee began to carry out his work from home. This drastic change to telecommuting has been made without being aware of all the implications it has and the vulnerabilities it creates, especially at a time when cyber attacks continue to increase.

“Cybercrime is the number 1 crime in the world. In Spain, the number of attacks on SMEs increased by 186%. The incidents reach a number of 55 billion”

Source: OECD (Organization for Economic Co-operation and Development)

The increase in workers who telecommute right now has not stopped increasing, reaching practically all of them. This implementation, which was initially intended to be carried out in stages, has ended up being an obligation for many companies.

This has caused initial uncertainty and discomfort for many of the companies and their employees, who have been forced to have their workers work from home without precedent. Neither of them felt ready to make the change, but they have been forced to accept it..

“The 79% of the workers are already telecommuting.”

Source: PGI Global Telework Study

«The 78% of the Spaniards declares itself satisfied with this modality.»

"The telecommuting stands as a decisive criterion when choosing a job.

Source: The Economist

Since the implementation of teleworking, to protect and try to avoid all the vulnerabilities created by the situation, it was essential to put together the idea of teleworking with security since, in general, From home, workers do not have the security and many of the facilities that in the office or in the company's facilities if they have.

  1. They don't have the same installations and the same secure network what is in the company.
  2. The material changes if the company does not yield computer equipment.
  3. Change the communication between employees and superiors (communication is digitized).
  4. there is not the same security and digital control is lost.

That is why, with the implementation of teleworking, companies must be more careful and cautious with their workers and provide the entire organization with security and protocols adequate in order to avoid future problems or try not to create new vulnerabilities that did not exist before.

 

How to apply an action plan to guarantee cybersecurity in teleworking? 

Currently, how to apply an action plan to guarantee cybersecurity in teleworking is one of the biggest challenges faced by organizations and IT teams. Due to the application of teleworking applications, data, users and their devices are leaving the company's zone of control so the probability of being attacked is greater, it increases exponentially.

 

From Tranxfer we want to remind you of some keys for safety in teleworking:

  • Establish a secure VPN connection

Employees need remote access to information and resources stored on corporate networks. That is why it is vital to be able to establish a secure connection so that no one can access this information. It is important to create a virtual private network or VPN as a solution to network problems and thus avoid possible vulnerabilities. With the use of VPN it will be possible to protect the information that passes between the client and the server.

The 76% of the respondents expects an increase in remote access in the short term.

Source: IDC study

 

  • double authentication

On the part of the company and the employee it will be vital to make a authentication of the content that is sent and opened. This ensures that only the chosen people can access the documentation sent. It will also be necessary to verify who enters each device and the different contents of the company.

 

  •  Communications encryption

Communication encryption is process of encoding or encrypting data so that it can only be read by someone with the means to return it to its original state. With this encryption it is achieved that the receiver can access the information only if he is the person that the sender decides.

 

  • Avoid BYODvarious interfaces

The concept of Bring Your Own Device (BYOD) you are pbecoming popularized and this poses a problem for IT staff as they have less control over the devices users use to access corporate applications and data. When the worker uses a personal device, which he also uses in a playful way, he puts the organization at risk. For good security in teleworking The company must provide each of its employees with the necessary electronic devices to be used exclusively for work.

“The shift to remote work has caused 47 % of companies to see an increase in the use of personal devices for work. As a result, a total of 82 % of the companies consulted ensure that they actively allow BYOD in some of its forms»

Source: Digital Transformation Magazine

 

  • ZeroTrust

The concept ZeroTrust part of the idea that organizations would not have to trust any internal or external entity enter its perimeter. It assumes that there can be attackers both inside and outside the network. 

 

How Tranxfer can help solve these problems

With the use of Tranxfer, many of the problems raised previously can be solved and security can be achieved in teleworking. Transfer offers:

 

  • Send and receive files securely

Tranxfer ensures the sending and receiving of files in the safest way and with traceability thanks to its technical characteristics.

 

  • Choose your shipping and display preferences

With Tranxfer you can choose and deprive users from viewing documents to have total control of all the files and documents that are sent. You can also make use of the display only module where a watermark will be generated automatically in the documents and the receiver will only be able to view the files, neither download nor edit them.

 

  • Prevents entry and exit of Malware

Transfer contains a Integrated Antivirus to prevent malware. It is constantly updated, works with flexible and scalable multithreading and makes use of a command line scanner and advanced tool.

 

  • Control information leakage

With the DLP-module of Tranxfer it is possible to control and prevent the unauthorized exit of information outside the company. This module constitutes a security barrier to prevent unwanted information leaks, whether voluntary or involuntary.

 

  • End-to-End Encryption (E2E)

With the E2E encryption Tranxfer manages to maintain end-to-end file confidentiality and integrity. We shield the transfers from E2E using Digital Signature techniques to guarantee that the genuine version of the file is available.

 

  • Double factor authentication

Tranxfer makes use of double factor authentication via email or SMS to ensure that the documents or files reach the recipient properly.

 

  • O365 plugin 

The Office 365 plug-ins It serves to work in an integrated way in the user's mail and thus make teleworking easier and more efficient. With this plugin you also avoid having programs running unnecessarily.

 

 

From Tranxfer we really like a phrase he said Miguel Monzó, our Chief Technology Officer, because we believe that it perfectly defines how teleworking, or work in general, should be related to security. Says the following:

“The keys to security begin and end with employee awareness”

Source: Miguel Monzó Montes, Chief Technology Officer of Tranxfer

 

More than 1 million licensed users

More than 5 million recipients 

Contact us for more information: [email protected]

Or through our social networks:

LinkedIn Logo | BRAND LOGOSLinkedIn Y Twitter  Twitter Logo - PNG and Vector

More articles