8/31/2023 0 Comments Keep it simple stupid alternative![]() However, some backup systems don’t require employees to access their services through a virtual private network (VPN), creating blind spots for data protection strategies in legacy backup systems. In addition, for the various organizations and individual people relying on cloud service providers for backup, working remotely can affect their endpoints, which require data protection. For instance, without the oversight and support of an onsite IT professional or team, employees might be tempted to use personal devices, break with defined security protocols, or simply not update their software as regularly and appropriately as they would if they were in the office. Unfortunately, however, these steps and guidance cannot overcome all of the issues unique to working from home (or the office, for that matter). And, ignoring requests for personal information should be a given. ![]() Direct them to think twice (or even three times) before clicking links and to implement strong passwords. So, from an IT management standpoint, what are you to do? An ideal place to start is to simply train employees to be on guard for unknown and/or suspicious email addresses. There appears to be no end to the new and creative ways cybercriminals can find to infect our devices with viruses and malware designed to access, steal and hold our data for ransom. In fact, with a historic level of employees working remotely, security incidents sparked by email phishing attacks grew 80% according to this recent Verizon Data Breach Investigations Report. While many of the initial associated bumps have been overcome, it appears that just as quickly as we think we have secured our devices, networks, and data, we find that cybercriminals are seemingly one step ahead. A paradigm that is predicted to last in full or hybrid fashion perhaps indefinitely. Over the past year, COVID-19 quarantines, lockdowns, and self-imposed isolations sent tens of millions of people around the globe to work, learn and shop from home. This entry was posted in Cybersecurity Data Backup and tagged Retrospect on Jby Editorial Staffīy JG Heithcock, GM, Retrospect, a StorCentric company
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |