Nearly every account online now requires a few extra layers of security. From answering questions about your first pet in order to check your email, to receiving a code through text message for a gaming app, there are more and more efforts to protect your online accounts. While it may feel excessive to some, these extra steps are important layers of protection designed to help you called Multi Factor Authentication (MFA).
MFA, sometimes referred to as two-factor authentication or 2FA, is a security enhancement that allows you to present two pieces of evidence – your credentials – when logging in to an account.
Your credentials fall into any of these three categories:
Your credentials must come from two different categories to enhance security – so entering two different passwords would not be considered multi-factor.
MFA is a simple way to boost your business’s cybersecurity strength. While other security programs and software can potentially be bypassed by a threat actor, a solid MFA is more difficult to hack. Not only will the hacker need access to your name and password, they’ll also need information from one of the other categories such as access to your smartphone or your fingerprint.
This sort of protection is especially important when dealing with business networks. Having access to things like client data, employee information, and proprietary documents can be extremely valuable to a hacker. That’s why MFA is a good idea when protecting your business information. Before implementing Multi Factor Authentication, each organization should do a Risk Assessment to determine their levels and sources of threats. Once you know where and how someone could infiltrate your system, the better prepared you’ll be to enable security, like MFA, in the proper places. You’ll also be able to see which members of your team need higher levels of security. For example, members of the executive team may need to have a stricter security access process than someone working janitorial services. It’s all about being able to examine the needs of your organization and working from there.
On top of protecting your business information from being stolen, you’re also protecting it from being damaged. Not all threat actors want to steal data. Some malicious attacks are done with the intent of destruction. Using a simple, extra layer of security with MFA can help protect your data from both.
The great thing about MFA is that most people are already using it! That includes most banks, credit cards companies, Amazon account, college savings accounts, investment and retirement accounts. Your employees have probably been using MFA for a few years now with their personal emails and through other accounts.
Since several large corporations are now requiring MFA, that should make the transition for your company even more seamless. People should feel more confident using MFA, since it’s been part of daily life already for many people using online services. The less confusion when introducing a new security program, the better!
It’s also something clients will recognize when you’re trying to explain the security of your business to help ensure confidence in business dealings. When you are able to tell a potential client you have MFA set up within your organization, that will help instill some confidence in your protection of their data.
Just because it works, doesn’t mean it has to be complicated. While much of cybersecurity can appear confusing and overwhelm people, MFA is pretty straightforward. There are even some free applications, like Google Authenticator, to setup MFA on personal devices.
When choosing an MFA program for your business, there are several options designed for organizations of different sizes. To choose the best option for your operation, talk with a cybersecurity consultant to determine what will work best for your needs.
While anti-virus and firewalls are important, they’re not always effective alone. MFA can make your existing security measures even stronger. It may take a few extra steps and a little more time, but the benefits of MFA can greatly outweigh the additional work.
First decide where MFA is necessary in your organization, then determine which program is the best fit for your company. Once you have it established, continue to monitor the effectiveness of the MFA program and your cybersecurity as a whole. For more information on how to analyze your security strength and choose an MFA program, reach out to a cybersecurity expert with Pratum today!
As more organizations are preparing to head back to the office, there are several aspects of returning to work that need to be evaluated first. In our previous blog “Cybersecurity Preparation for Returning to the Office” we looked at the various aspects of returning to a shared workspace; social distancing, document shredding, and policies & procedures. One important area to remember is technical considerations.
You should have a plan in place to address things such as remote connectivity use or system protection. That’s what we’ll be covering here; the top technical considerations for returning to the office.
When working from home, many employees may have found new ways to connect to the internet or office network. Something you should be asking yourself before these employees return to the office is: Are VPN's or personal remote management software being used that your company isn't aware of?
The longer these connections are established, the greater the chance of them being used as an attack vector. It's important to perform a full review of your environment. Be sure to leverage existing security tools to validate data is protected and restricted appropriately. This step can be done prior to returning to the shared work environment and should be monitored regularly with employees who work from home.
On top of remote management software, you should also be checking for other software employees may have introduced to company devices. Perform a software inventory review on corporate devices as soon as possible. Evaluate whether software is approved or needs to be removed. It is also a good idea to review what devices are on your network to ensure they are approved devices.
Software such as a LogMeIn, TeamViewer, PCAnywhere, etc. should not be leveraged if it isn't managed by the business. If these aren’t configured properly they could be used as an attack vector into the device or even the corporate network. Certain EULA's/licensing may be in violation as well if these are being used for commercial use under a personal license. Contact your employees about what they have installed onto their company devices and do a scan once those devices are safely back on company premises.
It is important to ensure all devices that communicate with the corporate network are routinely protected. That includes malware protection. Next generation anti-virus or endpoint detection and response software should be used to constantly monitor rogue or malicious activity.
Proper configurations, including alerting and monitoring, will assist with informing IT/Security teams immediately. This can help to address any issues but also minimizes the chances of an infected machine spreading to other devices.
Businesses should prepare for employees and their systems to come back to the office with potential threats, such as malware. This may leave IT and Security staff with limited resources to combat the issues.
Teams should evaluate whether a planned approach will ensure protections exist to identify compromised or infected systems before they can spread to the corporate network. Much like the ability to overwhelm hospitals, IT/Security teams can get overwhelmed during a malware outbreak. Introducing multiple infected devices without the proper protection on them or the corporate network could be devastating to a business.
Take the time to integrate devices back into the network slowly. Be sure scans are done properly, and not rushed to get the office space filled with employees again. Taking a methodical approach to scanning and re-integration may be the key to protecting your business from widespread cyber threats.
Many employees and businesses have taken certain liberties to ensure their business processes could continue to flow while working from home. These processes may not have been the most secure approach. It's important that any risks that were introduced are identified and mitigated.
Company culture, such as use of personal devices or incorrect data protection, may also have been hindered. Be sure to introduce additional user training once employees do return, to ensure these practices do not continue. This is also a great time to review how prepared your business was before the pandemic and ensure you take steps to be better prepared in case of future disruptions.
Planning out the best process to begin returning to the office should be a discussion between executives and IT/Security staff. Open communication will help them prepare the technical considerations that need to be established so the risk of a virus or other cyber-attack is limited. If you would like help determining the risks your business faces, or other cybersecurity concerns when returning to a shared work space, please feel free to reach out to the experts at Pratum!
After months of working from home, businesses are starting to consider the return of employees to the office. While there are health concerns being considered during this decision-making process, there are also security considerations that need to be addressed. We’ve put together a list of cybersecurity preparations organizations should start to make now, before they head back to the office.
You may think heading back to the office would be as simple as grabbing your favorite coffee mug and preparing for morning commutes again. However, the sudden migration of employees from a secured office environment to a home office was no small feat. The transition from home to the office won’t be simple either.
Knowing where to start and how to prepare is key in ensuring the security of the business once people start returning. Being able to prepare now will allow for a smoother switch when the time comes. Your business is only as secure as the employees working for you, so their participation in these steps will be critical to a safe return.
While this may be due to health concerns, it will have an impact on your office space and devices. If you need to reorganize your work spaces to allow for more distance between employees, you also need to map out where computers and other devices will need to be set up.
Consider creating a floor plan and marking where each employee will go. Talk to your IT department about what adjustments need to be made to the current infrastructure to allow for more space between employees. Let employees know about any relocation coming. Planning ahead and knowing where everyone will be located once they return to the office will help the process be less stressful for the employees and management.
Another process you should be preparing for now is scanning any devices that were used for work purposes and are being brought back into the office environment. A full system scan will help detect any threats or security risks that may have been introduced while away from the office. You want to make sure these devices are clear and secured before reintroducing them to the actual network.
Make a list of any and all devices that will be coming back to the office. Make a schedule of when each device will be returning. Then decide how you want to handle the reintroduction phase.
In addition to computers, employees also need to consider what else they brought home that needs to come back to the office. That includes portable media devices, like USB sticks or external hard drives with company data. Remind your staff that anything used for business purposes needs to be returned to the office.
Not only do they need to bring back what they took, they also need to bring whatever they’ve created at home. If documents were taken home or printed, they need to be returned to the office for either filing or shredding.
Also be sure employees are removing any documents or data from devices that will not be returning to the office. It’s important that no business information is left floating around on someone’s home hard drive.
If you haven’t already done so, now is a great time to review your Remote Working Standards. This is a list of acceptable use and other rules the organization deems as valid and approved for remote working. That can include who employees need to talk to about working remotely, and more technical controls.
You should also examine any other controls that were loosened or changed during this time of transition. Make sure those are reevaluated before returning to the office.
While this time of uncertainty has been difficult on everyone, it is important to instill confidence in your employees by clearly communicating how the process back to the office will work. Clear direction and open lines of communication will help create a more secure environment, and more comfort for employees.
If you have any questions about the steps listed here, feel free to reach out to a Pratum representative today!