Back

Why working from home is a hackers dream, here are five key steps to protect yourselves…

According to a recent article in the Times on Tuesday, a laptop containing sensitive military documents was found on eBay.

Worst still, the laptop had the default username and password of “guest” and allowed the buyer to browse all the information unhindered.

What does this mean for the typical company – and size is irrelevant here as it applies to one or a hundred laptops.

In a rush to work from home with the Covid-19 Coronavirus outbreak, laptops are being rapidly deployed and loaded up with company data and documents without taking sensible precautions and possibly not considering if data could then be compromised further on.

There are some simple steps that can solve the main areas of risk and give peace of mind when managing your company running from staff home premises were business-grade security would not usually be in place.

Whoever you use for your IT support and security, have them confirm if they have carried out the following or are able to offer the technology to lock things down.

  1. Make sure default guest accounts are disabled, and the admin accounts are renamed to mycompanyadmin or similar. Make sure the password is sophisticated and not used anywhere else.
  2. Install Antivirus and AntiMalware Technology – obvious really, but are the licences, management and detection configured to be maintained while outside the office – are the updates dependant on being in the office and are you confident that you can see the updates are being applied.
  3. Ensure Bitlocker for PCs or Filevault for Mac to encrypt your laptop storage drives – if you ever lose the laptop, all the information will be rendered useless. 
  4. Sophos Technology can be used to manage an entire company in one go to help with GDPR compliance at the same time.
  5. Protect yourself with Multi-Factor Authentication. This simple technology augments the simple password so that a regularly changing number via a smartphone has to be typed in along with a password to be able to log in – virtually uncrackable and ensures that only authorised people can gain access.
  6. Use a fully hosted platform like the CIS Bunker Remote Company System where all users and data are kept in a secure environment that doesn’t require data to be kept physically on individual laptops, therefore any theft or loss of the laptop will not affect data security.

Get in Touch

CloudSecurityCommunicationsSupportGDPR
(Read Data Terms Policy)

Client Feedback

We are delighted to be working with CIS, the project is already looking well organised and innovative. CIS delivers a prompt professional service with trusted knowledge we can rely on at all times.

John Story, Head of IT

St Paul’s Cathedral

CIS have been our go-to IT supplier for nearly 20 years, and throughout that time they have been flexible, consultative, and above all putting our business at the forefront of their advice. I would be very pleased to recommend them for any company that needs to have a real partnership with their IT company.

Graham Hughes, Managing Director

Rovema UK Ltd

Previous
Next

Keep Up To Date

close

CIS Overview

Cloud

Cloud

  • CIS Private Cloud
  • Infrastructure as a Service
  • Backup & Disaster Recovery
  • Remote Desktop Services
Security

Security

  • Anti-Virus & Ransomware
  • Extensive Encryption
  • Firewall & Next-Gen UTM
  • Penetration Testing
  • Digital Rights Management
  • Phishing
  • Mobile Device Management
Communications

Communications

  • Exchange Server Hosted & On Prem
  • Mail365
  • Unified Communications
  • Office 365
  • Mobile & VoIP Telephony
  • Internet Connectivity
Support

Support

  • Consultancy
  • Analysis & Audit Services
  • User Training & Enablement
  • Fully Managed Support
People

People

Since its inception in 1989 CIS’ philosophy has always been the same. We believe that in order for our team mates to provide the best possible service to our clients and to remain motivated and inspired themselves, we have to create a positive and stimulating working environment. One that encourages ambition, a continued exchange of ideas and dialogue, hard work, performance and loyalty. We have always rewarded our staff for going the extra mile and for embracing our company ethos but we also aim to make their working experience enjoyable and fun, working on the basis that humour can go a long way and fairness and respect are paramount.

Portfolio

Portfolio

Even though we say this ourselves, our portfolio is first class. We offer a range and quality of Cloud Services that can cater for all our customers’ business goals and aspirations. It’s our job to find the perfect solution for your requirements and you’ll benefit from the research and development carried out by our team to find the ideal system solutions for you.

Partners

Partners

Partners are vital to the ongoing success of our company so we nurture our award-winning network of like-minded organisations, building up mutual trust and respect in our working practices that can only benefit our customers.

Productivity

Productivity

It has always been of key importance to CIS to achieve high levels of productivity and to ensure that we remain s highly effective, lean and fast-moving organisation. It allows us to keep ahead of the game and to spot and act upon new products and trends whenever possible. By keeping on our toes, we can pass on benefits to our clients and partners without the need for time consuming learning curves.