Keep Your Business and Personal Computing Separate

Nov 2, 2017 | Technology

This blog post was originally published by Lunarline and is re-printed here with permission.

Keep Your Business and Personal Computing SeparateAnyone who has ever fired up a web browser knows that file-sharing sites can be a shady affair. Intuitively, we sense there’s something “off” about any site offering free downloads of the latest movies, music, and software. Those who understand the peer-to-peer based distribution of files on these sites have even more reason to stay away.

That doesn’t even take into account recent news that some pirating sites have been forming unholy alliances with hackers to distribute malignant programs.

Most employees understand it’s unwise to visit these kinds of sites using work computers. They could easily end up with ransomware or some other virus that could negatively impact their company and lead to serious disciplinary action. And yet, amid increasing use of bring your own device policies, many workers still mix personal computing with business tasks on the same device. They simply trust that restricting their use to reputable sites will keep them safe from such issues.

But the web can be a dangerous place — even if you stick solely to well-known, reputable sites.

Hackers have been known to hijack traffic from these destinations to execute “drive-by malware” infections, installing spyware, rootkits, ransomware, and other malicious programs. Other cybercriminals take to popular social media platforms, employing various phishing tactics to trick users into revealing personal information.

Unwitting employees can easily fall prey to hackers on the web, and it’s in the interest of their organizations to mitigate the risk. Here are a few recommendations on how you can do just that.

  1.  Emphasize privacy training: Your employees are your first line of defense against cyberattacks. Make sure they understand their role in fighting hackers by keeping personal computing off business resources.
  2. Structure networks for protections: BYOD can actually work in your favor if you have personal devices connected to separate networks and unable to access private data.
  3. Limit access: Don’t give employees unrestricted access to data outside their roles. Instead, manage access rights through proper identity management practices.
  4. Lead by example: Take steps to implement a culture of good cybersecurity at work.

Lunarline offers a range of consultative services and cutting-edge products to help you enhance your security protections and get employees on board. For more information on how we can assist you, contact us online today.

AdminPro Training VIP Pass

 

Procedures Pro book

 

Check Out Julie’s Books!