Listen to this story

Subscriber Benefit

As a subscriber you can listen to articles at work, in the car, or while you work out. Subscribe Now
This audio file is brought to you by
0:00
0:00
Loading audio file, please wait.
  • 0.25
  • 0.50
  • 0.75
  • 1.00
  • 1.25
  • 1.50
  • 1.75
  • 2.00

Employees have long been a vulnerable entrance point for hackers. Well-meaning employees quickly jump to comply with requests from higher-ups, work through email communication in a timely manner, or return a misplaced USB drive to its rightful owner. While the last scenario isn’t an issue while employees work remotely, hackers are using the remote environment to enhance and increase cyberattacks on company’s employees.

Volume of cyberattacks has increased drastically as workers navigate unfamiliar territory of remote work. For IT leaders, ramping up cybersecurity moves to the top of the to-do list. Supporting a secure environment today requires two components: the right technology plus employee support in the form of communication and training.

Communicating the need for diligence is a strong start for employees. We recommend clarity around the types of attack being seen and what to do when they are encountered. Share as much detail as possible, even visuals of the fraudulent emails if available. Right now, that means sharing that emails regarding COVID-19 test offers, cures, or news are likely fraudulent and should be marked as such as well as sharing to monitor for fraudulent texts.

Further, especially if your workforce tends to be uncomfortable with technology, it’s likely beneficial to support them with experiential cybersecurity training. A training program will also provide the IT team with an understanding of which employees require more support and then provide additional training. An important note for success will be continuing to communicate to employees as known risks are identified. It’s helpful for them to know if there are specific attacks going around.

A secure technology stack is vital for every organization – especially for a dispersed workforce in uncertain times. In best practice, the security components include enhanced email security products, multi-factor authentication, risk e-identification, and phishing reporting. Within these components, an IT team or partner is able to ensure that the maximum amount of protection is available and see reporting of what attacks are happening, how often, and to what or whom. This reporting informs adjustments needed to the products and communication required to employees to keep them informed.  

IT teams and partners are heavily supporting organizations right now with ensuring the right technology and training is available for a productive and collaborative remote work environment. Ensuring that the environment is secure is a vital role for organizational success as well.  

Story Continues Below

Get the best of Indiana business news. ONLY $1/week Subscribe Now

One Subscription, Unlimited Access to IBJ and Inside INdiana Business Subscribe Now

One Subscription, Unlimited Access to IBJ and Inside INdiana Business Upgrade Now

One Subscription, Unlmited Access to IBJ and Inside INdiana Business Upgrade Now

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In