{"id":31824,"date":"2021-11-15T10:17:48","date_gmt":"2021-11-15T10:17:48","guid":{"rendered":"https:\/\/www.digife.it\/?p=31824"},"modified":"2021-11-15T10:19:08","modified_gmt":"2021-11-15T10:19:08","slug":"cybersecurity-smart-working","status":"publish","type":"post","link":"https:\/\/www.digife.it\/en\/cybersecurity-smart-working\/","title":{"rendered":"Cybersecurity in smart working"},"content":{"rendered":"<h3><b>How to protect your smart working devices and data<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The phenomenon of <\/span><b>smart working<\/b><span style=\"font-weight: 400;\">, which exploded recently due to the pandemic, has now become part of everyday life for many Italian workers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">THE <\/span><a href=\"https:\/\/www.istat.it\/it\/files\/\/2021\/07\/Pillole_Rapporto_Annuale_2021.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Istat data<\/span><\/a><span style=\"font-weight: 400;\"> reveal a rapid and sudden growth in remote work, which went from 5% in 2019 to 14% in 2020 (on average), with peaks also of 57%, for highly specialized professions. Many of the companies involved have also shown their willingness to continue this trend.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><b>smart working <\/b><span style=\"font-weight: 400;\">it therefore seems destined to remain. For this reason, it becomes important that employees are prepared to deal with problems <\/span><b>cybersecurity <\/b><span style=\"font-weight: 400;\">that could arise away from the office.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are 10 tips to keep your devices and data safe from hacker attacks, scams and other dangerous agents.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Follow your company&#039;s safety guidelines<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In<\/span><b> smart working<\/b><span style=\"font-weight: 400;\"> one of the simplest but, at the same time, most important tips is to follow the guidelines of the company. In fact, most companies already have a <\/span><b>cybersecurity<\/b><span style=\"font-weight: 400;\">, to protect data and employees from cyber threats. Good practices usually include, for example, not opening suspicious e-mails and not visiting unsafe sites (sites that do not have the wording <\/span><a href=\"https:\/\/www.digife.it\/en\/july-2018-chrome-will-report-all-http-sites-as-unsafe\/\"><i><span style=\"font-weight: 400;\">https<\/span><\/i><\/a><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If in doubt, contact your company&#039;s IT department and ask them how to proceed. Also take advantage of any tools that the company may make available, such as antivirus software and VPNs.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Keep work devices separate from personal devices<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Having two separate computers for work and leisure is a very important measure in terms of <\/span><b>cybersecurity<\/b><span style=\"font-weight: 400;\">. Although it may seem convenient to be able to access work documents from your mobile phone or, vice versa, to be able to control social networks from the company computer, this is strongly discouraged.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keeping your work and personal accounts separate, in fact, reduces the risk of suffering data breaches. And, in the unfortunate event that it still happens, this trick minimizes the amount of sensitive data that hackers have access to. This is particularly important for companies that need to manage their customers&#039; personal data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This practice also allows you to keep your work separate from your personal life. This prevents family members who may have access to your personal devices from stumbling upon important work documents, installing malicious apps or, more generally, interfering with your work.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Make sure your wi-fi is protected<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Working in<\/span><b> smart working <\/b><span style=\"font-weight: 400;\">you must necessarily have a private wi-fi network. But be careful that anyone who has access to your wi-fi has access to your devices.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So be sure to change the router&#039;s default password to a personal one. Do not choose a password that is too easy or one that contains personal data that is easily found (such as names or addresses). For added protection, remember to make periodic updates on your devices.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, avoid using public wi-fi networks. As convenient as it may be to be able to access work documents from the comfort of a caf\u00e9 or park, public networks are easily accessible and therefore vulnerable and unsafe.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Beware of phishing<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.commissariatodips.it\/approfondimenti\/phishing\/phishing-che-cose\/index.html\" target=\"_blank\" rel=\"noopener\"><b>phishing <\/b><\/a><span style=\"font-weight: 400;\">is one of the most common methods by which scammers compromise security and sensitive information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The scam is quite simple, but effective: a scammer, pretending to be a trustworthy entity, contacts the victim via email with a request for personal information, such as the access credentials to their bank account.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be especially wary of suspicious emails, which typically come from bogus addresses, contain (often gross) grammatical errors, and try to instill a false sense of urgency.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This strategy is particularly insidious in a work situation<\/span><b> smart working<\/b><span style=\"font-weight: 400;\">, in which personal interactions are minimized and communications are almost exclusively via email.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Protect all devices<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For mobile devices such as cell phones and tablets, remember to set automatic lock, so that they turn off automatically after a certain amount of time, and location tracking, so that they can be detected in case of theft or loss.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Secure sensitive data<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A security measure to protect the most sensitive data is to assign a <\/span><b>password <\/b><span style=\"font-weight: 400;\">also to the folders or files that contain them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are also cloud platforms that allow encrypted file sharing, which often have better security measures than simple e-mail.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nevertheless, it is always a good idea to keep a copy (backup) of your most important files, perhaps to be kept on an external hard drive.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Create strong passwords for all devices<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Set one <\/span><b>password <\/b><span style=\"font-weight: 400;\">one for all devices may not be a sufficient security measure. For added protection make sure to use <\/span><b>password <\/b><span style=\"font-weight: 400;\">different (and as complex as possible) for each work tool.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Two-factor authentication<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To add an extra layer of protection you can use the<\/span><b>two-factor authentication<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the classic login credentials (username and password) this method requires further proof that you really own that account. This can be done via a specific app, such as Google Authenticator, or via SMS.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Video conferencing<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">One of the most serious dangers you can run into <\/span><b>smart working<\/b><span style=\"font-weight: 400;\"> it&#039;s about videoconferencing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first months of 2020 lockdowns saw an exponential increase in virtual conferences. A phenomenon that was accompanied by the so-called &quot;bombing&quot;. In fact, it was relatively easy for a hacker to bypass security measures and join any video call without an invitation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, today platforms like <a href=\"https:\/\/zoom.us\/\" target=\"_blank\" rel=\"noopener\">Zoom<\/a> they have introduced safer and more controlled systems. However, to avoid surprises, we recommend that you prevent unwanted entrances by using the \u201cwaiting room\u201d function and a password.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h4><b>Work with up-to-date operating systems<\/b><\/h4>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The last tip for working safely in <\/span><b>smart working<\/b><span style=\"font-weight: 400;\"> is to carry out periodic updates of the operating system.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although the most well-known and used operating systems, such as <a href=\"https:\/\/www.microsoft.com\/it-it\/windows\" target=\"_blank\" rel=\"noopener\">Windows<\/a> is <a href=\"https:\/\/www.apple.com\/it\/macos\/monterey\/\" target=\"_blank\" rel=\"noopener\">macOS<\/a>, support up to two previous versions, the current operating system is certainly the most secure and updated one.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, the same goes for all the programs installed on your devices, including the web browser. <\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>How to protect your devices and data in smart working The phenomenon of smart working, which exploded recently due to the pandemic, has now become part of the ...<\/p>","protected":false},"author":35,"featured_media":31825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[59,1,130],"tags":[],"class_list":{"0":"post-31824","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-notizie","8":"category-curiosita-web","9":"category-ecommerce"},"_links":{"self":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/posts\/31824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/comments?post=31824"}],"version-history":[{"count":0,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/posts\/31824\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/media\/31825"}],"wp:attachment":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/media?parent=31824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/categories?post=31824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/tags?post=31824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}