Cyber Security Tip: Working from home? DON’T DO THIS!

Cyber Security Tip: Working from home? DON’T DO THIS!

Jul 11, 2023

If you are working from home AND you’re using a personal device such as a smartphone or personal laptop to log in to company-owned cloud applications – STOP! Unless your personal device is covered under one of our managed security plans, you could accidentally introduce a virus or hacker to the company’s network.

ONLY devices that have our advanced cyber security tools installed and are under our vigilant watch of patching, updating and monitoring should be used to access your company’s data. Remember, data in the cloud is just as vulnerable as data at your office. In fact, 59% of ransomware incidents where the data is successfully encrypted involve data in the public cloud. The cloud is where the attacker stole the data AND where they store it awaiting ransom payments.

Side Note: We can set up a way for you to work from home securely; call our office if you would like us to set that up: 480-999-5468

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute call.

Related Posts

Cyber Security Tip: The #1 threat to your security is…

Cyber Security Tip: The #1 threat to your security is…

IT Security Tip #22:

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.

Cyber Security Tip: 3 essential rules for all cloud applications

Cyber Security Tip: 3 essential rules for all cloud applications

IT Security Tip #21:

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So, it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:

0 Comments