<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

Good health and no hacking completes a day in the life of lockdown

08 Apr, 2020
Good health and no hacking completes a day in the life of lockdown

Certain ground rules are to be taken into consideration while working from home at the time of this pandemic crisis.

Trouble teaches us more than the times of peace.

The corona pandemic has taught us many things which would otherwise be lost under our daily rush of life.

One of them is safety, not only from the virus but also from the other invisible power in the virtual universe the presence of which is a serious threat for corporate and other entities alike.

The hackers.

Corporate employees working from home must remember and abide by certain ground rules to keep their work and company credentials untouched by the bad actors.

Safety precautions now will yield better dividends later when the emergency gets over.

Here are a number of to dos to be done by the employers and employees alike as mentioned by Mr Sandeep Sengupta, Director, The Indian School of Ethical Hacking, at the online workshop on Managing Cyber Threats and Challenges of Data Confidentiality with Work from Home for STPI/Assocham on the 7th of April 2020.

  1. The employee must not forget that he is NOT under the office firewall protection.
  2. The IT department is not there at home to bail the employee working from home out of his IT system troubles.
  3. The employee working from home is operating his personal laptop which is not as well equipped as the office desktop.
  4. Work from home can take place from any place and not always a close confine. Hence data can be lost or misplaced by any means.
  5. Data is backed up in unencrypted external HDDs. Hence Bitlocker or Veracrypt is advised to be used.
  6. Software developers 3may download the entire code. Desktop on cloud is advised.
  7. In case the home WIFI network password has never been changed the hacker’s job becomes easy with the help of the Wire Shark tool.
  8. If the software developer is uploading code using FTP, the password is visible to the hacker.
  9. Is there a full tunnel VPN while connecting the office server by the office admin working from home, or a remote access tool like anydesk is being used?
  10. What type of device is used to do the office work, mobile, tab, laptop, home desktop?
  11. Does the company have hardening policy to ensure minimum security settings for mobile, video conferencing etc?
  12. Are the devices patched with the latest anti-virus?
  13. Is the device loaded with any un-approved software? Using white listing is advised.
  14. Is the device devoid of any key-logger or Trojan.
  15. Employees should be made aware of the crisis.
  16. The device should not be used by any one other than the employee to whom it is assigned.
  17. Email forwarding should be disabled or at least an alarm should be installed to make you aware of the same.
  18. Support staff should be on high alarm, controlling password resetting.
  19. Staff must be reminded that they will NOT be called for password re-setting.
  20. 2 factor authentication should be made compulsory for all remote workers with mobiles on lock screens.
  21. In case of working on rented laptops etc, the hard disks must be wiped to ensure no residual data is left when they are returned. DBAN tool comes handy for that.
  22. Suspicious links on Corona Virus should not be clicked on.
  23. No official device should be used to spread rumours or infotainment on issues of national seriousness like the pandemic.
  24. No confidential calls or business discussions near Smart Speakers like Amazon’s Alexa, Apple’s Homepod and Goolge’s Home.
  25. Microphone should be mute when not on conference call or after the call is over. A tape can also be pasted on the camera with a mic jak inserted in the auxiliary with the wire cut off.
  26. Health data of the employees must be secured and purged after a certain period.
  27. A 3 minute auto lock in all devices should be installed.
  28. Meetings should not be recorded, if at all, no confidential data should be discussed.
  29. Bank EMI deferring and OTP scam are the new risks for the corporates.
  30. ISO 22301 should be employed which is the Business Continuity Management System.

Wishing you happy working from home.

Give yourself some time while you work and relax and wait for the ordeal to get over.

ISOEH has stood the test of time in making the world aware of ethical hacking.

Read Other Tutorials

Read All Tutorials »

Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UDP based FTP with encryption

UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.

Read Details

Breaking News

Breaking News Of Each Month »
Cyber Scam in the days of Coronavirus & Lockdown
Cyber Scam in the days of Coronavirus & Lockdown

The recent pandemic was unexpected and unknown to most part of the world. It has changed our life and we are slowly adapting to our new lifestyle. The risks associated with the new lifestyle, both personal & corporate, are unknown to most of us.

Read Details