SlideShare a Scribd company logo
1 of 36
Download to read offline
Cyber
Security
Basics
Work From Home
Cybersecurity Basics
for Employees and
Employers
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Dinesh O Bareja
CISA, CISM, ITIL, ISMS, Cert ERM, Cert IPR
• COO – Open Security Alliance
• Researcher – indiawatch.in
• Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd
-- Cyber Peace Foundation
• Co-Founder – Indian Honeynet Project
• Ex Cyber Surveillance Advisor – CDRC (Jharkhand Police – Special Branch)
Enterprise & Government Policy Development; Cyber
Security Strategy, Design, Architecture; Current State
Security Assessment, Audit & Optimization;
Governance, Risk Management
ABOUT ME
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
We Went From Here
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
To Here!
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Our Happy Meetings Were This
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
And Now
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
7 Months Later
• We (workers) are not so happy
with WFH because
• Long and uncontrolled work
hours
• Domestic issues
• Work environment may not be
friendly… etc
• We, (Employers) are happy
because
• Situation has shown WFH works
and employees work
• Business model is being re-
designed for BIG financial saving
• Productivity levels and unlimited
availability of workforce… etc
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
The Present Situation
• All employers were FORCED to send employees home and ask them
to work from home
• All Employees rejoiced ! Now they have finally got what they had
been asking for! For a long time !! (But… it was against company
policy or only for senior management)
• Working from home is being called the new normal … to make
everyone happy !
• From the information security standpoint – the threat surface has
increased, new risks have cropped up, the responsibility for secure
working is greater
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Crackers
(Malicious
Hackers), Cyber
criminals are
happy
• Plenty of targets
• Weak defenses
• Thousands of paths
• Multiple points at home
• Users not in controlled environment
• Social engineering will work taking
advantage of loneliness and
psychological weaknesses
• Easy spear phishing / whaling
• Exploit corona virus FUD factor,
fake news, information overload
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Cyber criminals are opportunistic
and will look to exploit fears, and
this has undoubtedly been the case
with the Coronavirus outbreak
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
A Target
Without
Boundaries
Stay Safe… Don’t Become One
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Target
Without
Boundaries
Stay Safe… Don’t Become One
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself – Your
Workspace &
Workplace
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Workspace (place)
• Hide the wall, shelves, utensils behind you with a backdrop
• Light up the desk and shut down from behind you. Poorly lit video
calls are not good
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – YOU & YOUR NEW NORMAL
• Obtain and keep a list of names, phone numbers, email
and WhatsApp, so you have the correct contact
coordinates for HoD, TL’s and team members from your
department, and the following:
• Stay alert for out-of-the ordinary events when browsing,
working on your computer, phone calls etc
• If you fall victim report it to your IT / IS support
immediately
• IT
• IS
• BC/DR
• HR
• Admin
• Finance
• HelpDesk
• Legal
• Police
• Fire
• Courier
• Taxi
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Workspace (place)
• Keep a workspace / place which is quiet and private
• If not possible, keep your self on mute always!
• Clear and clean desk … de-clutter
• Consider addition of a monitor and UPS to your home office
• Secure your wifi (whitelist all devices, set a strong pwd)
• For your official computer - set a password and lockout screen
• Get a good ergonomic chair – you are going to be sitting in a
chair much more than you ever sat in office!
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Workspace (place)
• Wear a decent shirt always before starting your work day
• Keep a glass of water nearby
• Educating family members about life in the new normal !
• Discuss and share the rules of working with all family
members
• Tell them what your employer expects and request their
help
• Keep children, adults, water and food away from your
workspace
• Do not have your meals at your workstation and do not eat
when on a call
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself – Your
Devices
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Device(s)
• Your ant-virus, system updates should happen automatically (if
configured so by your IT team) do not stop the process
• Do not install any software (crack, freeware, unlicensed), pirated
movies, or download pirated books, images
• Stay away from torrents, dark web, ecomm and free download sites
• So not click any links in emails (or website) – Stop, Read, Verify, Click
• Make sure your device is configured securely by the IT team and has
all the authorized applications
• Do not plug in any other devices or USB into your official device
• Keep access to yourself and do not use for any domestic work
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself –
Communication
Channels
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Communication Channels
• Get a good mic and headset … test it to see it works good with your
video conferencing application
• Try to get a noise cancelling headset (does not matter whether it is
children playing around, there are a bit too many noises in or
environment)
• Consider purchasing a webcam and a bright table lamp so that your
video quality is good
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Communication Channels
• Upgrade your broadband
connection
• Subscribe to a good data plan –
keep this as a backup to your
broadband connection
• Walk around your home to see
where you get the best
cellphone signal so you know
where you should be if you are
on a phone call
• Do not trust emails with links
claiming to have important
updates (bogus links may lead to
devices being infected)
• Do not share company
information with anyone who
calls you or connects on social
media
• Remember email, phone
numbers, voice can be spoofed
• When asked for such
information, hang up and call
back (use the phone numbers in
your Comm list)
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself –
Your Work
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Secure Yourself – Your Work
• Make sure your anti virus is working and updated
• Allow your system update to happen, do not postpone
• Save your work with passwords
• Save to your official cloud space
• If you are an independent person working from home, back up to
an external device periodically (weekly?)
• Change settings on your office applications to save your work in real
time or every 5 minutes (or less)
• Be extra vigilant – do not open attachments from unknown sources,
forward to IT/IS team
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Securing
Yourself –
Mind Body & Soul
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
• Take a break from your chair
• Live by the clock (does 9 to 5
work? Make it work, draw the
line)
• Meditate, pray, paint, sing,
chores, play music, carrom,
scrabble.. whatever … keep
your life intact
• Exercise, walk, cycle, climb
stairs
• Meals with family
• Go slow on TV shows, movies
Secure Yourself – Your Body, Mind & Soul
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Employer
Support
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Employer Support Obligations
• Set work timings and dissuade
late evening meetings
• Provide video conferencing
account
• Communication protocol – ask
the person to call back (do not
feel offended if the person does
not share information and insists
on calling back)
• Personalized Communication
Directory with names etc
• WFH code of conduct and Policy
• Acceptable Use policy and
procedure for WFH assets, VPN
• BCP and DR procedure for WFH
• Advisories, Awareness training
• Employee inclusion programs
• Company announcements, and
new successes … etc
Provide Policies and Procedures that include
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
Reality is Humorous
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
ABOUT ME
MY CONTACT
INFORMATION
Information Security professional
working hard to stay abreast of
technology, risks, threats,
opportunities and looks forward
to the excitement of the future..
E dinesh@opensecurityalliance.org
@bizsprite
L: linkedin.com/in/dineshbareja
+91.9769890505
dineshobareja
dineshobareja
opensecurityalliance.org
dineshbareja.com
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
WFH Cybersecurity Basics For Employees and Employers
04 Nov 2020
This document has been created by IndiaWatch., Open Security Alliance., Dinesh O Bareja, EzRisk and
released in the public domain under Creative Commons License (Attribution- Noncommercial 2.5 India)
http://creativecommons.org/licenses/by-nc-sa/2.5/in/
Disclaimer and Copyright
The information and practices listed in this document are provided as is and for guidance purposes only and should not be construed
to be a standard (unless mentioned otherwise). Readers are urged to make informed decisions before adopting the information given
in this document.
The author(s) may not be held responsible, or liable, in any event and for any issues arising out of the use of the information and / or
guidelines included in this document. Further, we do not give any warranty on accuracy, completeness, functionality, usefulness or
other assurances as to the content in the document. We disclaim all responsibility for any losses, damage caused or attributed, directly
or indirectly, from reliance on and the use of such information.
Readers are welcome to provide feedback to the authors using the contact information provided in this document. This document has
been prepared for general public distribution so all animations have been converted to static images.
Graphics and images are usually obtained from the internet with every effort being made to ensure they are from royalty-free sources;
other images are usually acknowledged by us. Errors may be expected in this practice, however, this is not intentional. - we respect
creative rights and request owner(s) to inform us of any inadvertent omission. Trademarks or companies may be displayed, or
mentioned, with the purpose of establishing a point or for better understanding and we do not claim any exclusivity or relationship
with their respective owners.

More Related Content

What's hot

Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk ManagementEC-Council
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information SecurityJohnHPazEMCPMPITIL5G
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 

What's hot (20)

Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 
Data breach
Data breachData breach
Data breach
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 

Similar to WFH Cybersecurity Basics Employees and Employers

Business as usual, but from home instead!
Business as usual, but from home instead!Business as usual, but from home instead!
Business as usual, but from home instead!robertgibbons
 
How to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of CoronavirusHow to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of CoronavirusEvaris Solutions Plc
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19Net at Work
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureIIMBNSRCEL
 
How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveChristi Williams (Keating)
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015Luis Moreno Campos
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely Case IQ
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 

Similar to WFH Cybersecurity Basics Employees and Employers (20)

Business as usual, but from home instead!
Business as usual, but from home instead!Business as usual, but from home instead!
Business as usual, but from home instead!
 
How to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of CoronavirusHow to stop your business from collapsing because of Coronavirus
How to stop your business from collapsing because of Coronavirus
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Pcs academy october_2020_security
Pcs academy october_2020_securityPcs academy october_2020_security
Pcs academy october_2020_security
 
Pcs security waves
Pcs security wavesPcs security waves
Pcs security waves
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 
How To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay ProductiveHow To Enable a Remote Workforce & Stay Productive
How To Enable a Remote Workforce & Stay Productive
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
The Time is Now for Big Data Issue 1.5 - Lisbon Edition 03FEV2015
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely Tips, Templates and Best Practices for Conducting Investigations Remotely
Tips, Templates and Best Practices for Conducting Investigations Remotely
 
Team black
Team blackTeam black
Team black
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 

More from Dinesh O Bareja

Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 

More from Dinesh O Bareja (20)

Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 

Recently uploaded

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

WFH Cybersecurity Basics Employees and Employers

  • 1. Cyber Security Basics Work From Home Cybersecurity Basics for Employees and Employers
  • 2. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Dinesh O Bareja CISA, CISM, ITIL, ISMS, Cert ERM, Cert IPR • COO – Open Security Alliance • Researcher – indiawatch.in • Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd -- Cyber Peace Foundation • Co-Founder – Indian Honeynet Project • Ex Cyber Surveillance Advisor – CDRC (Jharkhand Police – Special Branch) Enterprise & Government Policy Development; Cyber Security Strategy, Design, Architecture; Current State Security Assessment, Audit & Optimization; Governance, Risk Management ABOUT ME
  • 3. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 4. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 5. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 6. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 7. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 We Went From Here
  • 8. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 To Here!
  • 9. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Our Happy Meetings Were This
  • 10. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 And Now
  • 11. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 7 Months Later • We (workers) are not so happy with WFH because • Long and uncontrolled work hours • Domestic issues • Work environment may not be friendly… etc • We, (Employers) are happy because • Situation has shown WFH works and employees work • Business model is being re- designed for BIG financial saving • Productivity levels and unlimited availability of workforce… etc
  • 12. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 The Present Situation • All employers were FORCED to send employees home and ask them to work from home • All Employees rejoiced ! Now they have finally got what they had been asking for! For a long time !! (But… it was against company policy or only for senior management) • Working from home is being called the new normal … to make everyone happy ! • From the information security standpoint – the threat surface has increased, new risks have cropped up, the responsibility for secure working is greater
  • 13. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Crackers (Malicious Hackers), Cyber criminals are happy • Plenty of targets • Weak defenses • Thousands of paths • Multiple points at home • Users not in controlled environment • Social engineering will work taking advantage of loneliness and psychological weaknesses • Easy spear phishing / whaling • Exploit corona virus FUD factor, fake news, information overload
  • 14. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Cyber criminals are opportunistic and will look to exploit fears, and this has undoubtedly been the case with the Coronavirus outbreak
  • 15. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 A Target Without Boundaries Stay Safe… Don’t Become One
  • 16. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Target Without Boundaries Stay Safe… Don’t Become One
  • 17. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Your Workspace & Workplace
  • 18. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Workspace (place) • Hide the wall, shelves, utensils behind you with a backdrop • Light up the desk and shut down from behind you. Poorly lit video calls are not good
  • 19. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – YOU & YOUR NEW NORMAL • Obtain and keep a list of names, phone numbers, email and WhatsApp, so you have the correct contact coordinates for HoD, TL’s and team members from your department, and the following: • Stay alert for out-of-the ordinary events when browsing, working on your computer, phone calls etc • If you fall victim report it to your IT / IS support immediately • IT • IS • BC/DR • HR • Admin • Finance • HelpDesk • Legal • Police • Fire • Courier • Taxi
  • 20. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Workspace (place) • Keep a workspace / place which is quiet and private • If not possible, keep your self on mute always! • Clear and clean desk … de-clutter • Consider addition of a monitor and UPS to your home office • Secure your wifi (whitelist all devices, set a strong pwd) • For your official computer - set a password and lockout screen • Get a good ergonomic chair – you are going to be sitting in a chair much more than you ever sat in office!
  • 21. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Workspace (place) • Wear a decent shirt always before starting your work day • Keep a glass of water nearby • Educating family members about life in the new normal ! • Discuss and share the rules of working with all family members • Tell them what your employer expects and request their help • Keep children, adults, water and food away from your workspace • Do not have your meals at your workstation and do not eat when on a call
  • 22. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Your Devices
  • 23. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Device(s) • Your ant-virus, system updates should happen automatically (if configured so by your IT team) do not stop the process • Do not install any software (crack, freeware, unlicensed), pirated movies, or download pirated books, images • Stay away from torrents, dark web, ecomm and free download sites • So not click any links in emails (or website) – Stop, Read, Verify, Click • Make sure your device is configured securely by the IT team and has all the authorized applications • Do not plug in any other devices or USB into your official device • Keep access to yourself and do not use for any domestic work
  • 24. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Communication Channels
  • 25. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Communication Channels • Get a good mic and headset … test it to see it works good with your video conferencing application • Try to get a noise cancelling headset (does not matter whether it is children playing around, there are a bit too many noises in or environment) • Consider purchasing a webcam and a bright table lamp so that your video quality is good
  • 26. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Communication Channels • Upgrade your broadband connection • Subscribe to a good data plan – keep this as a backup to your broadband connection • Walk around your home to see where you get the best cellphone signal so you know where you should be if you are on a phone call • Do not trust emails with links claiming to have important updates (bogus links may lead to devices being infected) • Do not share company information with anyone who calls you or connects on social media • Remember email, phone numbers, voice can be spoofed • When asked for such information, hang up and call back (use the phone numbers in your Comm list)
  • 27. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Your Work
  • 28. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Secure Yourself – Your Work • Make sure your anti virus is working and updated • Allow your system update to happen, do not postpone • Save your work with passwords • Save to your official cloud space • If you are an independent person working from home, back up to an external device periodically (weekly?) • Change settings on your office applications to save your work in real time or every 5 minutes (or less) • Be extra vigilant – do not open attachments from unknown sources, forward to IT/IS team
  • 29. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Securing Yourself – Mind Body & Soul
  • 30. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 • Take a break from your chair • Live by the clock (does 9 to 5 work? Make it work, draw the line) • Meditate, pray, paint, sing, chores, play music, carrom, scrabble.. whatever … keep your life intact • Exercise, walk, cycle, climb stairs • Meals with family • Go slow on TV shows, movies Secure Yourself – Your Body, Mind & Soul
  • 31. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Employer Support
  • 32. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Employer Support Obligations • Set work timings and dissuade late evening meetings • Provide video conferencing account • Communication protocol – ask the person to call back (do not feel offended if the person does not share information and insists on calling back) • Personalized Communication Directory with names etc • WFH code of conduct and Policy • Acceptable Use policy and procedure for WFH assets, VPN • BCP and DR procedure for WFH • Advisories, Awareness training • Employee inclusion programs • Company announcements, and new successes … etc Provide Policies and Procedures that include
  • 33. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 Reality is Humorous
  • 34. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 ABOUT ME MY CONTACT INFORMATION Information Security professional working hard to stay abreast of technology, risks, threats, opportunities and looks forward to the excitement of the future.. E dinesh@opensecurityalliance.org @bizsprite L: linkedin.com/in/dineshbareja +91.9769890505 dineshobareja dineshobareja opensecurityalliance.org dineshbareja.com
  • 35. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020
  • 36. WFH Cybersecurity Basics For Employees and Employers 04 Nov 2020 This document has been created by IndiaWatch., Open Security Alliance., Dinesh O Bareja, EzRisk and released in the public domain under Creative Commons License (Attribution- Noncommercial 2.5 India) http://creativecommons.org/licenses/by-nc-sa/2.5/in/ Disclaimer and Copyright The information and practices listed in this document are provided as is and for guidance purposes only and should not be construed to be a standard (unless mentioned otherwise). Readers are urged to make informed decisions before adopting the information given in this document. The author(s) may not be held responsible, or liable, in any event and for any issues arising out of the use of the information and / or guidelines included in this document. Further, we do not give any warranty on accuracy, completeness, functionality, usefulness or other assurances as to the content in the document. We disclaim all responsibility for any losses, damage caused or attributed, directly or indirectly, from reliance on and the use of such information. Readers are welcome to provide feedback to the authors using the contact information provided in this document. This document has been prepared for general public distribution so all animations have been converted to static images. Graphics and images are usually obtained from the internet with every effort being made to ensure they are from royalty-free sources; other images are usually acknowledged by us. Errors may be expected in this practice, however, this is not intentional. - we respect creative rights and request owner(s) to inform us of any inadvertent omission. Trademarks or companies may be displayed, or mentioned, with the purpose of establishing a point or for better understanding and we do not claim any exclusivity or relationship with their respective owners.