Cyber security concerns have increased as employees move to work from home, with video conferencing becoming a key new area of concern.
This is according to Bryan Baxter, corporate IT business development manager and IITPSA KZN chapter committee member, who was addressing the first online IITPSA KwaZulu-Natal AGM this month.
Amid a significant move to cloud and massive adoption of video conferencing tools, home-based employees were often not equipped to counter cyber threats, Baxter said.
“One issue is that we will end up using consumer tools for enterprise, and security at home is simply not sufficient for what business needs to do,” he said.
He noted that all applications could be vulnerable, as illustrated by problems that had been reported in using tools such as Zoom, which had seen user adoption soar to around 200 million daily users. “Zoom experienced huge adoption over a short space of time, in addition to challenges such as misconfiguration, uneducated users and cyber security flaws.”
With many organisations likely to continue fielding a remote workforce for some time to come, Baxter advised them to pay extra attention to the video conferencing tools they used for business, and to the security measures their employees had in place at home.
“When selecting a video conferencing solution, businesses must ensure that they are fit for purpose for enterprise use, assess the end user experience, and also look at the vendor – considering how quickly they respond and how much the business trusts them. Businesses must look at factors such as cost, ease of use, integration, mobility, confidentiality, integrity, availability and also overall safety,” Baxter said.
“In addition to making informed decisions when selecting a vendor, businesses need to pay attention to strong passwords – use a password manager, reset passwords every three months, and use two-factor authentication,” he said.
Home workers should change the default admin passwords on their routers, enable WPA2 encryption, use strong passwords for their wireless networks, and be aware of all the devices on the home networks, ensuring that they too had strong passwords, were updated regularly and that their default configurations were changed, he said.