DON’T MISS AN UPDATE
- What we do
- About Ctac
- About Ctac
- Corporate Governance
- Investor Relations
- Client cases
- News & Media
In our previous blog post you can find out what you need for good connections between the office and a remote workplace. If there’s one thing that’s key in a blog series about modern working, it’s security. That’s exactly what this blog is all about: how do you turn your digital workplace into a secure place to work?
Companies are the victims of cybercrime every day. Around one in five companies are affected, according to the Dutch Chamber of Commerce. And that number is growing. In 2021, over half a million phishing sites were detected worldwide for the first time in history. Online crime takes on far more diverse forms than just phishing, which is when criminals steal login details, credit card details, PINs and other information.
Another notorious form of cybercrime is to insert a virus that corrupts or even completely wipes the data on your computer. Criminals often spread such viruses via emails, known under the name of malicious software, or malware. Two other common forms of cybercrime are ransomware and DDoS attacks. Ransomware makes files on your computer inaccessible. Criminals then request a sum of money to get rid of the blockade. A DDoS attack is a form of hacking where your internet connection, website or app is overloaded until it grinds to a halt.
Whether you work in the office or at another location, a secure workplace is increasingly important. The era when you worked in a shared folder on a local server is history. Working in the cloud is the new normal. It’s therefore important to ensure your company data is protected. In this blog post, we give you three tips on how to do this well. It’s also important that the devices that give you access to this company data are well-protected, for example with Mobile Device Management (MDM) and Mobile Application Management (MAM).
Make sure that your chances of falling victim to cybercrime are as low as possible. Use (cloud) solutions and services based on security by design as much as you can, as these are solutions that have been designed with security in mind. The same applies to privacy by design – a solution where both security and privacy were considered during the design phase to enforce careful handling of personal data. For example, is it actually necessary to request personal data such as someone’s first name and surname, gender and age? Can some data be anonymous? Privacy by design has already considered this during the design phase of the product or service.
Finally, no matter how well-organised your technical security is, human beings always remain the weakest link. Cybercriminals use what are called social engineering techniques to focus on people. Experience has shown that this is an effective technique. You likely think this is a million miles removed from your daily life, until things go wrong in your business. To make sure you and your employees are, and remain, vigilant, it may be useful to organise a security awareness training course that raises employees awareness of the very real threat of cybercrime.
In the next, and final blog of this series on modern working, we’ll talk about a worry-free and successful workplace, about remote support and the importance of increasing knowledge and skills within your organisation.