Meeting v spolocnosti GAMO a.s.

Dangerous home office

We offer solutions to protect your data and your business from disaster

It’s been a year since we brought our personal and professional life to the online world. We communicate through platforms, download distance learning apps, shop through eshops, and last but not least, work from home office. And it is working from home that today poses a huge cyber hazard and risk of disaster for the business. It’s about unwittingly creating a comfortable environment for hackers. What to do about it?

After awkward beginnings when employers acceded to the inevitability of working from home, companies are considering preferring this form going forward. That’s fine, as long as they meet the basic technical requirements. These are hardware equipment, secure connectivity to company systems or logistics for identifying software and hardware problems and solving them. Plus people’s personalities, individual capabilities and home backgrounds need to be taken into account. All of this should be provided, checked and improved by the company to make its secure home office work.

The most risky component: human

As the number of critical IT infrastructure and the complexity of systems grows, so does the vulnerability of technologies. In addition, the quality and frequency of targeted attacks is growing disproportionately fast. It often doesn’t take a skilled hacker for access data to end up in the wrong hands. In fact, the vast majority of modern attacks target the weakest link – the human, and people tend to overlook and underestimate security issues until everything is right. Here again, prevention is always cheaper than recovery, in these cases in the form of shut down production, deleted databases or confidential documents flying freely across the Internet.

GAMO CEO Rudolf Latiak says of the investment in cybersecurity: “The good feeling of saving money lasts for companies only until something serious happens. In the end, they lose more than they saved, or in the worst case, everything.”

Healthy security = healthy company

So the question is, how have you prepared your business for cyber threats. Can you prevent the risks associated with the theft of sensitive data, misuse of cloud access or use of unsecured equipment? Have you addressed the logistics of working from home? Can you prevent the risks associated with:

  • Uncontrolled movement of corporate data over the Internet;
  • Risk of sensitive data theft;
  • Misuse of the equipment for private purposes by a household member or other unauthorised person;
  • Abuse of cloud access;
  • Using an unsecured device without the company’s knowledge?

There are legislative measures to ensure or enhance the security of the corporate IT environment. For example, you can follow the ISO/IEC 27002 Best Practices in Information Security. It includes measures and guidance for dealing with issues such as protection of sensitive data, asset management, access and access rights management, operational security, communication security, data transmission security, security incident management and more.

Based on the education, you will then choose the most suitable technological solution and range of services for your company. Even after their selection, you should only use the most secure cloud services, collaboration tools, video conferencing systems or remote access to the internal network.

Microsoft 365 package

The most common solutions for security are Microsoft 365 packages. They contain advanced security features that work reliably and at all times without the need to always be in the same place or city. Simply separate the working world from the home world and have a security policy in place to control the management of all devices and data. Up to 99.9 percent of identity attacks are prevented by multi-factor authentication. The result is a secure office environment with a preferred combination of document sharing services, a common scheduler, team sites and applications.

GAMO Drive solution

For those who are not a fan of the above and would prefer secure cloud storage with guaranteed reliable protection, there is GAMO Drive. The service fully meets the requirements for a secure modern office. The cloud storage for sensitive data takes care of storing, archiving, sharing and synchronizing documents.

Only authorized users have access to the information in GAMO Drive, not even the service provider itself. Data and information security is guarded by multi-level encryption protection, and universal access allows documents to be accessed from any device. In addition, each customer defines their own preferences and rules for working with documents such as editing, downloading, uploading or reading. OnlyOffice can be used for full-fledged work or quick document interventions within the online office.

The security and simplicity of exchanging and sharing documents with customers convinced the accounting and tax consulting company LOGRO, which appreciated another important factor in the form of customization of the solution, for GAMO Drive.

“The adaptation of the visual environment makes our client feel that they have entered LOGRO,” says managing director Ailin Hank. “The solution impresses clients professionally and is easy to use for everyone. The advantage is the flexibility, the possibility of using the service even on mobile phones,” he adds.

Ailin Hanková, LOGRO s.r.o.
Securely with up to 300 people online

The choice of online communication is also very important from a security point of view. There are several effective tools, the most well-known are platforms of global brands such as Microsoft, Cisco or Google. However, if it is a video conferencing system, which has all the prerequisites for online communication to be comfortable for both organizers and participants and at the same time without security risks. Its web-based solution does not require installation and is available after logging in via the meet.gamo.sk web portal. It allows you to organize online conferences for a large number of participants, interactively share the content of presentations, vote or engage participants in a controlled way in a discussion with the maximum security of a cloud-based solution.

The service is regularly verified by independent certification authorities

The Golden Rule 3-2-1

If we say in the introduction that man is the most risky factor, it must be emphasised in the conclusion that he is also the most sensible one if he opts for prevention. Complementary to the above, and absolutely the easiest for avoiding a failure scenario, is the use of the 3-2-1 rule. Simply three layers of physical backup. Backups will help with accidentally deleted emails and documents, spontaneously corrupted and hacker-encrypted data, or virus-destroyed sensitive data.

Don’t wait for an attacker to steal and encrypt your data or delete backups – and avoid financial blackmail.

End cap with ESET

If you prefer a cohesive system of IT security solutions providing a comprehensive view, consider choosing an endpoint attack detection and response tool. For example, from ESET. The Endpoint Detection & Response tool collects real-time event data on connected endpoint devices and automatically checks if the data matches the criteria for suspicious activity. It also enables you to identify unusual behavior and attacks, assess risks, and resolve incidents and unwanted activity on the network. Not excluding the fact that it is a Slovak company solution, respected worldwide.

Prevention is the most effective and cheapest

There is no one-size-fits-all way to make working from home absolutely secure and resistant to cyber threats. That’s why it’s important to ask a simple question and answer it honestly: Does the company have the internal resources and know-how to handle key issues in-house? Does it have the required level of security for real threats relevant to the type of business and size of the company? Security requirements are growing faster than their actual adoption in companies, so it is time to weigh all the pros and cons of corporate capabilities. The easiest step to start building a secure home office is to consult with companies that have security specialists. In fact, it is not at all necessary to have a cyber specialist in-house, but to invite them to work with you on a consultancy basis, as with legal or investment activities. The right combination of services will help – not only in the home office – to overcome any technical pitfalls. Experts will create the reliable environment the company needs. They will design a solution that protects against attacks and identifies suspicious internal incidents. A secure and reliable environment with all the essentials in one place will ensure smooth working from home. As a result, this will save the company significant finances and will not damage its reputation in the event of an attack. And here we are already talking about the millions and disgrace experienced by global giants such as Amazon, Maersk, Garmin, Rosneft and the US-Canadian pharmaceutical firm Merck, which lost $870 million due to destroyed research data. We are living in an age of social responsibility, and alongside this, it is essential to build corporate responsibility. Here, too, yesterday was too late.

Published: 16. May 2021

Jana Kohárová

Obchod

GAMO a.s.

This article is part of magazine no.

Published: 16. May 2021

advertising

Iveta Hlaváčová

We contacted representatives of three companies that are responsible in the field of cyber security and asked them for their...

Iveta Hlaváčová

GAMO is currently developing a virtual cyber marketplace, CYBER PLACE, which aims to connect services, education and awareness raising in...

Peter Bednár

GAMO a.s.

To say that SIEM is 'dead' is a statement that is highly debated in the cybersecurity community. It is true...
advertising