Working from home has very quickly become the new normal. Whether you're logging into a remote system from your home computer or your company has issued laptops for people to connect into the network, you and your company face greater potential for cyberattacks. You need to be more vigilant and take precautions you didn’t have to while working in the office.
What are Hackers Doing to Target Me?
Hackers can and will seek to exploit a workforce that suddenly finds itself relying on remote connections to conduct business. With remote workers on the rise, the potential for attacks has increased dramatically. Hackers are circulating, among other things, phony emails from company IT professionals, fake emails from vendors about software and tools, and COVID-19 outbreak maps. These communications often include attachments or links that look harmless but are loaded with malware that deploys remote access tools, keystroke logging malware, desktop image capturing malware and ransomware.
What Should I Do to Protect Myself and My Company?
Follow these best practices:
As we work in this new normal, it is crucial to proceed with caution. IT professionals are facing situations that a few weeks ago may not have seemed possible. For your sake and theirs, do what you can to minimize these risks.
For more resources and LP's response to COVID-19, visit this webpage.