Connect with us

News

COVID-19: Sophos shares five tips on how remote workers can stay cybersecured

Published

on

BY: Sandra Ani

Following the Federal and State Governments directives that businesses in Nigeria should adopt measures to curtail the spread of Coronavirus many if not most organisations have already crossed the “working from home”, or at least the “working while on the road” bridge.

Therefore, the global concerns over the current coronavirus (Covid-19) outbreak, and the need to keep at-risk staff away from the office, means that lots of companies may soon and suddenly end up with lots more staff working from home

A global cybersecurity Company has also suggested that it is vital not to let the precautions intended to protect the physical health of a company staff turn into a threat to their cybersecurity health at the same time.

“Importantly, if you have a colleague who needs to work from home specifically to stay away from the office then you can no longer use the tried-and-tested approach of getting them to come in once to collect their new laptop and phone, and to receive the on-site training that you hope will make them a safer teleworker”, Principal Research Scientist Sophos, Paul Ducklin, said while stressing that organisations  are now in need to set remote users up from scratch, entirely remotely, something some have not done a lot of in the past.

Ducklin went ahead to list five tips for working from home safely:

1. Make sure it’s easy for your users to get started:

“Look for security products that offer what’s called an SSP, short for Self-Service Portal. What you are looking for is a service to which a remote user can connect, perhaps with a brand new laptop they ordered themselves, and set it up safely and easily without needing to hand it over to the IT department first.

“Many SSPs also allow the user to choose between different levels of access, so they can safely connect up either a personal device (albeit with less access to fewer company systems than they’d get with a dedicated device), or a device that will be used only for company work.

“The three key things you want to be able to set up easily and correctly are: encryption, protection and patching.

“Encryption means making sure that full-device encryption is turned on and activated, which protects any data on the device if it gets stolen; protection means that you start off with known security software, such as anti-virus, configured in the way you want; and patching means making sure that the user gets as many security updates as possible automatically, so they don’t get forgotten.

“Remember that if you do suffer a data breach, such as a lost laptop, you may well need to disclose the fact to the data protection regulator in your country.

“If you want to be able to claim that you took the right precautions, and thus that the breach can be disregarded, you’ll need to produce evidence – the regulator won’t just take your word for it!

2. Make sure your users can do what they need

“If users genuinely can’t do their job without access to server X or to system Y, then there’s no point in sending them off to work from home without access to X and Y.

“Make sure you have got your chosen remote access solution working reliably first – force it on yourself! – before expecting your users to adopt it.

“If there are any differences between what they might be used to and what they are going to get, explain the difference clearly – for example, if the emails they receive on their phone will be stripped of attachments, don’t leave them to find that out on their own.

“They’ll not only be annoyed, but will probably also try to make up their own tricks for bypassing the problem, such as asking colleagues to upload the files to private accounts instead.

“If you’re the user, try to be understanding if there are things you used to be able do in the office that you have to manage without at home.

3. Make sure you can see what your users are doing

“Don’t just leave your users to their own devices (literally or figuratively). If you’ve set up automatic updating for them, make sure you also have a way to check that it’s working, and be prepared to spend time online helping them fix things if they go wrong.

“If their security software produces warnings that you know they will have seen, make sure you review those warnings too, and let your users know what they mean and what you expect them to do about any issues that may arise.

“Don’t patronise your users, because no one likes that; but don’t leave them to fend for themselves, either – show them a bit of cybersecurity love and you are very likely to find that they repay it.

4. Make sure they have somewhere to report security issues

“If you haven’t already, set up an easily remembered email address, such as security911 @ yourcompany DOT example, where users can report security issues quickly and easily.

“Remember that a lot of cyberattacks succeed because the crooks try over and over again until one user makes an innocent mistake – so if the first person to see a new threat has somewhere to report it where they know they won’t be judged or criticised (or, worse still, ignored), they’ll end up helping everyone else.

Teach your users – in fact, this goes for office-based staff as well as teleworkers – only to reach out to you for cybersecurity assistance by using the email address or phone number you gave them. (Consider snail-mailing them a card or a sticker with the details printed on it.)

“If they never make contact using links or phone numbers supplied by email, they they are very much less likely to get scammed or phished.

5. Make sure you know about “shadow IT” solutions

Shadow IT is where non-IT staff find their own ways of solving technical problems, for convenience or speed.

“If you have a bunch of colleagues who are used to working together in the office, but who end up flung apart and unable to meet up, it’s quite likely that they might come up with their own ways of collaborating online – using tools they’ve never tried before.

“Sometimes, you might even be happy for them to do this, if it’s a cheap and happy way of boosting team dynamics.

For example, they might open an account with an online whiteboarding service – perhaps even one you trust perfectly well – on their own credit card and plan to claim it back later.

“The first risk everyone thinks about in cases like this is, “What if they make a security blunder or leak data they shouldn’t?”

“But there’s another problem that lots of companies forget about, namely: what if, instead of being a security disaster, it’s a conspicuous success?

“A temporary solution put in place to deal with a public health issue might turn into a vibrant and important part of the company’s online presence.

“So, make sure you know whose credit card it’s charged to, and make sure you can get access to the account if the person who originally created it forgets the password, or cancels their card.

“So-called “shadow IT” isn’t just a risk if it goes wrong – it can turn into a complicated liability if it goes right!

Most of all, the Paul Ducklin added, “if you and your users suddenly need to get into teleworking, be prepared to meet each other half way.

“For example, if you’re the user, and your IT team suddenly insists that you start using a password manager and 2FA (those second-factor login codes you have to type in every time)…

“…then just say “Sure,” even if you hate 2FA and have avoided it in your personal life because you find it inconvenient.

“And if you’re the sysadmin, don’t ignore your users, even if they ask questions you think they should know the answer to by now, or if they ask for something you’ve already said “No” to…

“…because it might very well be that they’re asking because you didn’t explain clearly the first time, or because the feature they need really is important to doing their job properly.

“We’re living in tricky times, so try not to let matters of public health cause the sort of friction that gets in the way of doing cybersecurity properly!

Here are other Sophos resources related to COVID-19 that you may find useful:

SophosLabs has uncovered a variety of different malicious email campaigns connected to COVID-19, including:

Phishing scams impersonating the WHO, CDC, and other healthcare organizations to deliver malware via malicious documents disguised as official information on how to stay safe during the pandemic

Cybercriminals impersonating charities and relief organizations like the WHO’s COVID-19 Solidarity Response Fund to trick victims into sending them Bitcoin

SophosLabs is updating its Uncut blog with new findings in real time.

GrassRoots.ng is on a critical mission; to objectively and honestly represent the voice of ‘grassrooters’ in International, Federal, State and Local Government fora; heralding the achievements of political and other leaders and investors alike, without discrimination. This daily, digital news publication platform serves as the leading source of up-to-date information on how people and events reflect on the global community. The pragmatic articles reflect on the life of the community people, covering news/current affairs, business, technology, culture and fashion, entertainment, sports, State, National and International issues that directly impact the locals.

News

Math Teacher Accused Of Having Sex With 2 Students And Getting Pregnant For One Tearfully Reveals The Baby Was Taken Away From Her

Published

on

The UK teacher who had a baby with an underage student while on trial for having sex with another teenage boy broke down in court after revealing her newborn baby girl had been “taken away” from her.

Manchester math teacher Rebecca Joynes, 30, sobbed to jurors over how her baby was taken “24 hours after being born” this past January — and now she only sees her for nine hours a week, Joynes told jurors on Monday, May 13, according to the Manchester Evening News.

“At the moment I have contact with her three times a week for three hours and that’s it,” she said through tears.

Joynes was arrested and released on bail on orders not to have unsupervised contact with anyone under 18 after allegedly grooming her pupil, known as Boy A in court, by buying him a $430 Gucci belt before bringing him to her apartment for unprotected sex.

She was suspended from school and eventually fired, but soon after, she began having a relationship with a 15-year-old boy, known in court as Boy B, whom she had a baby with in January.

Joynes, who has denied having sex with either boy when they were underage, told the court that when she learned of the allegations against her she had gone to the second boy in a “panic” and he deleted all of her phone’s content.

The former teacher denied having a sexual relationship with the second boy until after he turned 16 and she was already suspended from teaching.

According to her narration,

She said he had added her on Snapchat twice, which she only accepted the second time because she thought he “wanted to tell her something.”

Joynes said a friendship developed and he quickly became her “best friend” even though the boy would make flirtatious and sexualized comments toward her when he was drunk.

She told jurors that it wasn’t until after his 16th birthday that he messaged her saying “I’ve left school now” with a winky face.

After she received notice that she had been dismissed from her job, he went to her apartment, where following an emotional conversation, they had sex.

The two then entered a relationship that Joynes described as “quite toxic” telling the court how the teenager was “very controlling.”

After discovering she was pregnant, Joynes hid love notes for the boy to find around her apartment.

The notes eventually led to a piece of baby clothing that had the words “I love my daddy to the moon and back” written on it.

The court was told that she gave birth to their baby girl in January, but following an emergency court hearing, the newborn was taken away from Joynes.

Joynes has denied two counts of sexual activity with Boy A; two counts of sexual activity with Boy B; and two counts of sexual activity with Boy B while being a person in a position of trust.

Her trial is ongoing.

Continue Reading

News

First Man To Receive Pig Kidney Transplant Has Died

Published

on

The first Man to receive a genetically modified pig kidney transplant has died two months after the operation.

Massachusetts General Hospital (MGH), which carried out the procedure in March, announced Sunday, May 12, that Richard “Rick” Slayman, 62, has died.

They said there was no indication his death was a result of the transplant.

Transplants of other organs from genetically modified pigs have failed in the past, but the operation on Mr Slayman, who was suffering with end-stage kidney disease, was hailed as a historic milestone.

In addition to kidney disease, Mr Slayman also suffered from Type 2 diabetes and hypertension.

In 2018, he had a human kidney transplant, but it began to fail after five years.

Following his pig kidney transplant on March 16, his doctors confirmed he no longer needed dialysis after the new organ was said to be functioning well.

“Mr Slayman will forever be seen as a beacon of hope to countless transplant patients worldwide and we are deeply grateful for his trust and willingness to advance the field of xenotransplantation,” MGH said in a statement.

Xenotransplantation is the transplanting of living cells, tissues or organs from one species to another.

MGH said it was “deeply saddened” at his sudden death and offered condolences to his family.

Mr Slayman’s relatives said his story was an inspiration.

“Rick said that one of the reasons he underwent this procedure was to provide hope for the thousands of people who need a transplant to survive,” they said.

“Rick accomplished that goal and his hope and optimism will endure forever.

“To us, Rick was a kind-hearted man with a quick-witted sense of humour who was fiercely dedicated to his family, friends, and co-workers,” they added.

While Mr Slayman received the first pig kidney to be transplanted into a human, it is not the first pig organ to be used in a transplant procedure.

Two other patients have received pig heart transplants, but those procedures were unsuccessful as the recipients died a few weeks later.

In one case, there were signs the patient’s immune system had rejected the organ, which is a common risk in transplants.

Continue Reading

News

Prince Harry And Meghan Markle Arrive Nigeria Today, May 10th

Published

on

The Duke and Duchess of Sussex came into Nigeria for a private visit following an invitation by the Chief of Defence Staff, Gen. Christopher Musa.

The Director of Sports, Defence Headquarters, DHQ, Air Vice Marshal Abidemi Marquis, said the founder of Invictus Games will spend three days in Nigeria and would interact with wounded soldiers and their families.

He said the visit scheduled from 10th to 13th May 2024 would help wounded soldiers in their recovery efforts.

Marquis said: “Because we realised that 80 per cent of our soldiers have been involved in this recovery programme, they are getting better.

“Their outlook on life is positive. You know, when you are engaged in, you experience a permanent disability, you know, issues, it affects your mental health and also your outlook on life.”

Prince Harry and Meghan who are already in Nigeria, First made a visit to children at the Lights Academy in Abuja, Nigeria.

Here are pictures.

Prince Harry and Meghan at Light Academy In abuja

Continue Reading

Trending