11 essential steps to reinforce cybersecurity

1 June 2020 Information Security

The sudden, radical move to remote working during this time of lockdown for South Africa brings with it the promise of a new and more effective way of working – without being bound to a physical office. Not only does this surge in the use of remote work capabilities have massive implications on the corporate culture and on productivity levels; but it also brings with it more immediate consequences from a security and privacy perspective that cannot be ignored.


Wayne Olsen.

So says Wayne Olsen, head of the security business unit at Datacentrix. Together with the team of security experts at Datacentrix, Olsen has compiled a guideline of eleven steps to ensure that businesses and their employees are protected while working remotely.

1. Use only devices approved by your organisation.

“It is critical that staff avoid using personal computers and tablets – as well as those shared with others – to work. Other users may have inadvertently performed activities that infect shared devices, or cause leaked information,” Olsen explains.

2. Use the virtual private network (VPN) when necessary.

VPNs, which provide secure direct connections to an organisation’s network, might be necessary when accessing files, working with sensitive information, or using certain websites. At home, workers should remember to update their router’s software, and also secure it with a lengthy, unique password.

3. Think before you click.

Olsen advises remote workers to avoid downloading or clicking on unknown links in emails – always verify the identity of the sender, double check the authenticity and accuracy of the sender’s email address, and verify the request with your employer if you are uncertain.

4. Beware of coronavirus-themed phishing emails.

Cybercriminals are exploiting the coronavirus outbreak by sending fake emails, including dangerous links, to employees. Here’s how it works: The email messages may appear to come from company officials, and might ask you to open a link to a new company policy related to the coronavirus, or to enable remote access to the company’s VPN. However, clicking on the attachment or embedded link will most likely download malware onto your device. Don’t click. Instead, immediately report the phishing attempt to your employer.

5. Guard your devices.

If your organisation allows you to work from your home, never leave your laptop, tablet or mobile phone (including any USB or external storage devices) unattended, warns Olsen. “Another point that should be top-of-mind is to avoid entering passwords where others can see them.”

6. Create strong passwords.

These must include a mix of upper and lowercase letters, numbers and symbols. Make them difficult enough that someone can’t guess them.

7. Don’t share passwords online.

If you must share login information with a co-worker, says Olsen, call them with the details instead of sending via email, text or instant message.

8. Use two-factor authentication.

Although it can be inconvenient, two-factor authentication, if available, provides an extra layer of security to keep hackers from accessing accounts.

9. Update your devices.

“If you are using a personal device that has been approved for teleworking, be sure that it is running the most current operating system and that your web browsers and other applications are also up to date,” he adds. “Also, confirm that you are running the latest antivirus software solution. Updates include important changes that improve the performance and security of your devices.”

10. When in doubt, contact your organisation, or your ICT service provider’s helpdesk.

Remove the guesswork by allowing the professionals to advise on actions that are in line with your business’ cybersecurity practices and procedures. This way, you can ensure that you aren’t opening up your devices – or your corporate network – to cyberattacks.

11. Don’t forget about securing video conferencing solutions.

Video conferencing solutions have been a boon for companies across the globe, allowing them to continue to run internal and external meetings but on a virtual level. However, some platforms have come under scrutiny from a cybersecurity perspective, with individuals joining meetings as uninvited guests and claims of users’ social media pages being hacked. Whatever the video conferencing solution being used, businesses need to check that employees are aware of potential vulnerabilities, and take steps to tighten security measures on these platforms.

“Just as everyone is responsible for helping to prevent the spread of the coronavirus by changing their behaviour, everyone is also accountable – as cyber citizens – to ensure that we protect ourselves and our companies from the ever-growing security risks posed by COVID-19. Hackers do not discriminate and are making use of this pandemic for financial gain. It is important that we all remain cautious and follow the guidelines in order to mitigate all of these risks,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.