If there is one thing we've learned about small business cybersecurity it's that there are a great many operators that are afraid to ask tough questions about cybersecurity... because they are worried what the answers might be. We specialize (tactfully, of course) in helping organizations raise and think through those tough questions -- and come out the other end safer and happier. Today we'll take on the issue of Remote Work, asking four of the tough questions that deserve to be asked. And giving you, our reader, a ray of hope that there are reasonable ways to resolve any cybersecurity loose ends made apparent by the question. Here goes:
WFH Cybersecurity Posts
Stating the obvious: over the past year, we've come to meet many people who now WFH (work from home). And, many of them rely on Xfinity router security to keep them safe. It's long overdue that we talk about that in specific terms, about what to expect -- and what not to expect -- if that description matches your situation. Equally important, it might describe many employees in your organization -- probably even employees that handle sensitive company information regularly.
For this particular post, we're going to focus mostly on malicious traffic filtering, although we have much more to say about Xfinity router security and WFH threats in future posts.
For years, work from home security took a backseat to office security. Then suddenly, everything changed. Work from home security became just as important (and sometimes more important) than office security. As companies grapple with how to make the dream of work from home security a reality, there are a handful of totally avoidable work from home security failures that have come to the forefront. Here are some of the biggest ones.
Here’s a math problem (sort of). What does “WFH” minus “DNS Filtering” equal? Before you answer, let’s get the basics out of the way on the terminology front.
Email Security Best Practices to Avoid Cyberattacks Over Email
Worried about the dangers of working from home for cybersecurity during the pandemic? Record numbers of employees are working from home for the time being, with a whopping 42 percent of the U.S. labor force now working remotely full-time. And as homes become...
Is the password manager you've been using for your personal accounts, good enough to be your password management solution for business? That's the topic before us today. This topic is courtesy of the past dozen-or-so small business owners who have asked us this question recently.
It's a fair question. Let's explore.
If you have a Business Continuity Plan, do you also need a Disaster Recovery Plan? If you have a Disaster Recovery Plan, do you also need a Business Continuity Plan? The distinction between these two types of plans is amongst the least understood topics that small businesses must navigate as they think about creating an environment of stability in the face of a cybersecurity incident. These plans extend beyond just cybersecurity matters, but here we'll focus on what's in our wheelhouse at Havoc Shield: cybersecurity.
DNS Filtering, Malicious Traffic Filtering, and Phishing Protection are terms that are sometimes used interchangeably. That's confusing for small business owners that want to cut through the terminology and simply know what action they should take to stay safe. Here, we'll explore the subtle differences between these terms -- in plain language that anyone can understand.
WFH cybersecurity is perhaps the fastest growing discussion in the security community this year, given the impact of COVID-19. A Gartner survey of HR leaders found that 91% had implemented work-from-home in their organizations as part of their COVID response. Along with WFH came new cybersecurity exposures -- at Havoc Shield we started fielding calls and emails along these lines. Read on for the scoop on some of the Fact and Fiction that is floating around.