Feb 08, 2023

Cybersecurity and Remote Work: 6 Steps To Protect Your Business

In 2020, the FBI reported 1.4 million cybercrime complaints, mostly identity theft, up from 651,000 in 2019. The cost to victims is estimated at $5.9 billion. Here are six low-cost steps to take to protect your business. Here is an overview of the key rules so you start off on the right foot.

 

In 2020, the FBI reported 1.4 million cybercrime complaints, mostly identity theft, up from 651,000 in 2019. The Federal Trade Commission received 4.8 million cybercrime complaints in 2020, up from 3.3 million in 2019. According to the Internet Crime Report, the cost to victims was $6.9 billion in 2021.

The time period reported in these statistics correlates to the shift to remote work due to the COVID-19 pandemic, which should serve as a warning to businesses and individuals who have not taken steps to protect their sensitive information from hacking, phishing or malware. Remote work is not going away, though, so business owners need to think about ways to protect the information they store online and in the cloud.

While cost is a factor for many small businesses, there are some simple, low-cost solutions that can provide protection.

1. Train employees

Implement a training program for employees that teaches them what to look for and gives them a reporting mechanism for possible breaches. For example, scammers know how to make their emails look real. Make it a company policy to check the URLs of emails before opening attachments or clicking on links.

2. Create a virtual private network

Establishing a VPN is a good way to protect information, especially when people work remotely. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks. In other words, VPNs allow users to send and receive data as if their computing devices were connected to a private network.

Keep in mind that while VPNs protect IP addresses and encrypt internet history, they do not act  the same way as antivirus or antimalware software does. In addition, be aware that not all VPNs use the proper security standards or promptly fix issues.

3. Install strong passwords

Having a strong password policy is key. Using two- or multifactor authentication is an important safety feature because it requires users to identify themselves. For example, with two-factor authentication, the user will need to know the verified user name and password as well as a personal identification code.

Another way to protect passwords is through the use of a password manager. Password managers either store passwords in an encrypted database or generate passwords on demand. Such programs may also have other functions, such as autofilling forms or storing credit card information.

There are three types of password managers:

  • Desktop password managers store passwords locally on the user's device.
  • Cloud-based password managers store encrypted passwords on the service provider's network.
  • Single sign-on password managers allow users to use one password for every application.

4. Keep software current

Be sure all software is automatically updated so the latest safety patches are installed.

5. Use role-based access control

Restrict access to sensitive information by restricting employees to a need-to-know basis. Such systems allow employees access only to the information they need to do their jobs.

6. Establish backup and recovery protocols

Install automated remote backup and data recovery to allow a copy of critical data to be stored in a secure offsite location.

Businesses need to put cybersecurity practices at the top of their to-do lists, especially in the current volatile economy. Some of the measures listed here do have associated costs, but those costs need to be weighed against the tangible and intangible costs of a breach.

©2023


 

MORE RECENT NEWS…


Sep 25, 2025

Social Security Fairness Act and Your Benefits

The Social Security Fairness Act repeals two long-standing rules that reduced Social Security benefits for many government and public sector workers. Read through to learn more about the act and whether these changes affect you.


Sep 24, 2025

Welcome Aboard: Tips for Successful Employee Onboarding

Congratulations! You've finally completed the demanding hiring process and you've made the right hire. You are now ready to welcome a new member to the team. Read through for some pro tips on best onboarding practices for the first day at work and beyond.


Sep 23, 2025

What Are the Best Payroll Practices?

Are you curious about the idea of a streamlined payroll process? It's a great way to make sure your entire payroll department is on the same page and operating with the same standards in mind. Read through for insights into the best payroll practices.


Sep 22, 2025

Know the Rules for Reimbursing Employees

When reimbursing employees for work-related expenses, are you using an accountable plan or a nonaccountable one? The difference affects how you report the payments and how your employee is taxed. Read through to learn the IRS rules and how to stay compliant.


Aug 29, 2025

Silver Workers: No Substitute for Experience

Once, employees approaching retirement age could look forward to a long, relaxing post-work life. For much of the 55+ crowd, this is no longer the case, with many forestalling retirement for as long as possible. Read through for advice on employing silver workers in your organization.


Aug 28, 2025

Show Me the Money: Creating a Salary Policy

For any company to treat their employees with respect and fairness, it needs to have a transparent pay equity policy in place that is shared with all employees. Read through to understand why creating pay equity is beneficial to your organization.




More News & Press can be found in our Archive.