WFH Cybersecurity Posts

Cyber SecurityRemote WorkWFH Cybersecurity

4 Tough Q’s: Remote Work & Small Business Cybersecurity

If there is one thing we've learned about small business cybersecurity it's that there are a great many operators that are afraid to ask tough questions about cybersecurity... because they are worried what the answers might be. We specialize (tactfully, of course) in helping organizations raise and think through those tough questions -- and come out the other end safer and happier. Today we'll take on the issue of Remote Work, asking four of the tough questions that deserve to be asked. And giving you, our reader, a ray of hope that there are reasonable ways to resolve any cybersecurity loose ends made apparent by the question.  Here goes:

Four Tough Questions - Remote Work and Small Business Cybersecurity
Cyber SecurityRemote WorkWFH Cybersecurity

When WFH Threats meet Xfinity Router Security

Stating the obvious: over the past year, we've come to meet many people who now WFH (work from home). And, many of them rely on Xfinity router security to keep them safe.  It's long overdue that we talk about that in specific terms, about what to expect -- and what not to expect -- if that description matches your situation. Equally important, it might describe many employees in your organization -- probably even employees that handle sensitive company information regularly.

For this particular post, we're going to focus mostly on malicious traffic filtering, although we have much more to say about Xfinity router security and WFH threats in future posts.

When WFH Threats Meet XFinity Router Security
Cyber SecurityPassword ManagersRemote WorkShadow ITWFH Cybersecurity

Totally Avoidable Work-From-Home Security #Fails

For years, work from home security took a backseat to office security.  Then suddenly, everything changed.  Work from home security became just as important (and sometimes more important) than office security.  As companies grapple with how to make the dream of work from home security a reality, there are a handful of totally avoidable work from home security failures that have come to the forefront.  Here are some of the biggest ones.

Totally Avoidable Work from Home Security Fails
Cyber SecurityWFH Cybersecurity

Business Continuity Plan vs Disaster Recovery Plan

If you have a Business Continuity Plan, do you also need a Disaster Recovery Plan?  If you have a Disaster Recovery Plan, do you also need a Business Continuity Plan?  The distinction between these two types of plans is amongst the least understood topics that small businesses must navigate as they think about creating an environment of stability in the face of a cybersecurity incident.  These plans extend beyond just cybersecurity matters, but here we'll focus on what's in our wheelhouse at Havoc Shield: cybersecurity.

Business Continuity Plan vs Disaster Recovery Plan
Cyber SecurityPhishingWFH Cybersecurity

DNS Filtering, Malicious Traffic Filtering, & Phishing Protection

DNS Filtering, Malicious Traffic Filtering, and Phishing Protection are terms that are sometimes used interchangeably.  That's confusing for small business owners that want to cut through the terminology and simply know what action they should take to stay safe.  Here, we'll explore the subtle differences between these terms -- in plain language that anyone can understand.

DNS Filtering - Malicious Traffic Filtering
Cyber SecurityWFH Cybersecurity

WFH Cybersecurity: Fact vs Fiction

WFH cybersecurity is perhaps the fastest growing discussion in the security community this year, given the impact of COVID-19.  A Gartner survey of HR leaders found that 91% had implemented work-from-home in their organizations as part of their COVID response. Along with WFH came new cybersecurity exposures -- at Havoc Shield we started fielding calls and emails along these lines. Read on for the scoop on some of the Fact and Fiction that is floating around.

WFH Cybersecurity and Motorcycles