The sudden shift to remote working left many employees lacking in proper cybersecurity training.
Kaspersky has introduced a new, free online module providing working-from-home security guidelines to ensure remote workers don’t endanger their businesses.
With more companies now switching to working from home due to the COVID-19 pandemic, Kaspersky has collaborated with Area9 Lyceum to offer the remote security guidelines module. It will educate customers on COVID-19 and maintaining a secure working-from-home environment.
Elena Molchanova is head of security awareness marketing at Kaspersky. She said the shift to remote work is many employees’ first experience of working from home.
“As this change was rather unexpected, some companies were not able to provide a training on security basics of remote working,” she said. “As such, employees may not know how to securely configure home Wi-Fi, install required updates or protect their own devices used for work, etc., as these were previously a duty of [the] IT department. In addition, they may not have a usual and convenient way to contact their IT department, for example, in case they receive a suspicious mail. So these employees may find themselves unprepared for new cybersecurity challenges.”
The module includes two parts. The first examines what COVID-19 is and how users should behave in order to minimize their chances of becoming infected. The second part discusses cyber safety and how users can protect their workplace from cybercriminals while working from home.
The modules take no longer than 30 minutes to complete and use an adaptive training approach so that they are personal, engaging and ensure skills retention.
“The lesson is free and everybody can share the link to the online training with his or her colleagues,” Molchanova said. “MSSPs play an important role in security training for their customers’ employees, and we are delighted that our partners are sharing this special course during the pandemic lockdown.”
Also Friday, the 2019 Global Encryption Trends Study by nCipher Security and the Ponemon Institute found 54% of business leaders consider their employees to be the biggest security threat. Hackers ranked third at 29%.
Employee mistakes continue to be the most significant threat to sensitive data, more than external hackers and malicious insiders combined. In contrast, the least significant threats include government eavesdropping and lawful data requests.
The main driver for encryption is protection of an enterprise’s intellectual property and the personal information of customers — both 54% of respondents.
With more data to encrypt and close to two-thirds of respondents deploying six or more separate products to encrypt it, policy enforcement was selected as the most important feature for encryption solutions. In previous years, performance consistently ranked as the most important feature.
Cloud data protection requirements continue to drive encryption use, with encryption across both public and private cloud use cases growing over 2018 levels, and organizations prioritizing solutions that operate across both enterprise and cloud environments.
“Organizations are under relentless pressure to protect their business-critical information and applications, and meet regulatory compliance, but the proliferation of data, concerns around data discovery and policy enforcement, together with lack of cybersecurity skills makes this a challenging environment,” said John Grimm, nCipher’s senior director of strategy and business development.
Automated Customer Experience Platform Ada Bolsters CCaaS Business in Channel
The 20 MSP Adds 2 More Companies, Part of Multiyear Growth Plan
No VMware Price Increases, SMB Neglect, Broadcom CEO Vows
Infoblox Rolls Out New Skilled to Secure Partner Program
Motivating Contact Center Agents with Gamification
Benioff Now Sole Salesforce CEO as 3rd Quarter Proves Strong
2023 Is the Remote Work Era
UK MSPs Face Strict New Cyber Regulations
Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.