{"id":76516,"date":"2020-04-03T13:48:13","date_gmt":"2020-04-03T05:48:13","guid":{"rendered":"https:\/\/www.i-sprint.com\/?p=76516"},"modified":"2023-04-28T09:28:02","modified_gmt":"2023-04-28T01:28:02","slug":"enhance-digital-identity-protection","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/enhance-digital-identity-protection\/","title":{"rendered":"How companies can enhance digital identity protection when adopting remote work"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1024\" height=\"576\" title=\"How-companies-can-enhance-digital-identity-protection\" src=\"https:\/\/www.i-sprint.com\/wp-content\/uploads\/2020\/04\/How-companies-can-enhance-digital-identity-protection-1024x576.jpg\" alt class=\"img-responsive wp-image-76661\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/04\/How-companies-can-enhance-digital-identity-protection-200x113.jpg 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/04\/How-companies-can-enhance-digital-identity-protection-400x225.jpg 400w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/04\/How-companies-can-enhance-digital-identity-protection-600x338.jpg 600w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/04\/How-companies-can-enhance-digital-identity-protection-800x450.jpg 800w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/04\/How-companies-can-enhance-digital-identity-protection.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 1024px\" loading=\"lazy\" \/><\/span><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:15px;margin-bottom:15px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-1\"><div align=\"justify\">\n<p><span style=\"font-weight: 400;\">The threat of coronavirus infection has prompted organisations to take swift action\u2014employees are encouraged to stay put and work from home. This allows businesses to continue operating while mitigating employees\u2019 risk of infection. But remote work opens up another threat, this time to your company\u2019s cybersecurity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike in an office setting where IT departments can easily monitor data security within the company\u2019s network, remote workers are accessing company databases through unsecured networks. This makes their devices, such as smartphones and laptops, more susceptible to malware attacks from third parties, thus putting sensitive <\/span><span style=\"font-weight: 400;\">information<\/span><span style=\"font-weight: 400;\"> and customer data at risk.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is especially true if remote <\/span><span style=\"font-weight: 400;\">employees<\/span><span style=\"font-weight: 400;\"> lack an understanding of the severity of cyber security-related risks. Cybercriminals are also becoming more sophisticated with their hacking techniques, particularly when it comes to stealing digital fingerprints. They\u2019re even starting to <\/span><a href=\"https:\/\/www.darkreading.com\/risk\/cybercrime-ais-growing-threat-\/a\/d-id\/1335924\"><span style=\"font-weight: 400;\">use artificial intelligence<\/span><\/a><span style=\"font-weight: 400;\"> to impersonate people and break into robust security systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">To avoid inadvertently becoming a gateway for hacks and cybercrime, <\/span><span style=\"font-weight: 400;\">companies need to build up their employees\u2019 cybersecurity awareness and employ various access and identity management tactics to minimize any security breach due to remote working:<\/span><\/p>\n<h3>Educate staff on security measures<\/h3>\n<p><span style=\"font-weight: 400;\">The first step is to educate employees on the importance of cybersecurity. Guide them on the proper <\/span><a href=\"https:\/\/www.natlawreview.com\/article\/coronavirus-covid-19-managing-cyber-security-risks-remote-work\"><span style=\"font-weight: 400;\">protocols<\/span><\/a><span style=\"font-weight: 400;\"> for accessing company data, and provide best practices for them to follow.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These include:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Avoiding downloading non-work related files or downloading from unsecured source files on company devices<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Avoiding the sharing of work computers and other devices with unauthorized personnel<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Disabling \u201cremember password\u201d functions on browsers<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Strengthen security by using an effective <\/span><a href=\"https:\/\/www.i-sprint.com\/solutions\/two-factor-authentication\/\"><span style=\"font-weight: 400;\">two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\"> solution<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">You should also train (or re-train) employees to recognise and report phishing measures. In light of current events, the World Health Organization (WHO) <\/span><a href=\"https:\/\/www.who.int\/about\/communications\/cyber-security\"><span style=\"font-weight: 400;\">warned of cybercriminals<\/span><\/a><span style=\"font-weight: 400;\"> sending malicious emails and pretending to be WHO officials to steal money. These phishing scams trick readers into providing sensitive information, clicking malicious links, and opening malicious attachments.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing scams exploit employees\u2019 lack of awareness of security practices. It was a phishing email that allowed a hacker to <\/span><a href=\"https:\/\/www.csoonline.com\/article\/3454443\/how-a-bank-got-hacked-a-study-in-how-not-to-secure-your-networks.html\"><span style=\"font-weight: 400;\">steal hundreds of thousands of pounds sterling<\/span><\/a><span style=\"font-weight: 400;\"> from Cayman National Isle of Man Bank in 2016. From June to October 2018, a <\/span><a href=\"https:\/\/healthitsecurity.com\/news\/4-month-breach-of-benefitmall-impacts-112000-plan-members\"><span style=\"font-weight: 400;\">phishing attack targeting Centerstone Insurance and Financial Services<\/span><\/a><span style=\"font-weight: 400;\"> went undetected, leading to the potential breach of almost 112,000 customers\u2019 data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ability to exploit employees\u2019 lack of suspicion is one reason why malicious emails are <\/span><a href=\"https:\/\/docs.broadcom.com\/doc\/istr-email-threats-2017-en\"><span style=\"font-weight: 400;\">among the most common forms of cyberattacks<\/span><\/a><span style=\"font-weight: 400;\">. These emails are often used to launch ransomware\u2014and damage costs to businesses arising from ransomware are expected to reach US$20 billion by 2021.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, it\u2019s important to provide employees with clear guidelines on how to report suspicious activity and potential data breaches. This information will be your best defense in the context of remote working.\u00a0<\/span><\/p>\n<h3>Establish secure access<\/h3>\n<p><span style=\"font-weight: 400;\">Deploying a Virtual Private Network (VPN) for remote access is a common way to ensure a secure connection between company systems and external employees. VPN services can hide the user\u2019s IP address, encrypt data transfers, and mask the user\u2019s location. These tactics can help protect sensitive information from the prying eyes of cybercriminals. Companies should also deploy additional authentication mechanisms on VPN login to ensure the right employees are entering the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For employees who need to access sensitive data, companies can deploy <\/span><a href=\"https:\/\/www.i-sprint.com\/products\/universal-credential-manager\/\"><span style=\"font-weight: 400;\">session monitoring and recording capabilities<\/span><\/a><span style=\"font-weight: 400;\"> to identify any possibility of a compromise that will impact your systems. It will also aid you in performing security audits, especially in the event of a suspected breach.<\/span><\/p>\n<h3>Keep passwords strong and varied \u2013 or use Single Sign-On solution<\/h3>\n<p><span style=\"font-weight: 400;\">A weak password is all it takes to break into a company&#8217;s system. The best way to get your employees to stop using simple passwords such as \u201c123456789\u201d for everything is to enforce a company password policy.\u00a0<\/span><\/p>\n<h3><a href=\"https:\/\/www.howtogeek.com\/195430\/how-to-create-a-strong-password-and-remember-it\/\">Traditional advice<\/a> would recommend:<\/h3>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Having a minimum of 12 characters<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Including numbers, symbols, and uppercase and lowercase letters<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Staying away from words found in the dictionary\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Not relying on substitutions (e.g., h3ll0 for \u201chello\u201d)\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">There\u2019s a catch: it\u2019s difficult to remember several complex passwords, so employees might end up listing them down on paper or noting them down on their phones or laptops. This exposes your firm to the possibility of password theft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One way to combat this is by enabling universal sign-on to the company\u2019s database and cloud systems. Opt for a <\/span><a href=\"https:\/\/www.i-sprint.com\/universal-sign-on\/\"><span style=\"font-weight: 400;\">single sign-on server<\/span><\/a><span style=\"font-weight: 400;\"> so you can avoid the time and cost required to manually install software on every single device. This will also help you lower help-desk costs by reducing the number of password reset calls.<\/span><\/p>\n<h3>Implement access controls<\/h3>\n<p><span style=\"font-weight: 400;\">Depending on their tasks, you can <\/span><a href=\"https:\/\/www.i-sprint.com\/products\/universal-credential-manager\/\"><span style=\"font-weight: 400;\">delegate access<\/span><\/a><span style=\"font-weight: 400;\"> to your remote team so they gain entry only to documents that are relevant to them at the time. Consider when access becomes unnecessary, and place restrictions once your employee has completed a task.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be sure to customize the level of access employees have to data as well. As the administrator, you probably have all the rights to move around and edit information. But for others, you can restrict their access by granting them viewing rights only. This ensures that they are unable to copy or download sensitive data into their personal devices.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you already have access controls in place, be sure to keep them updated, especially as employees\u2019 roles change.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can also add an extra layer of security by enabling <\/span><a href=\"https:\/\/www.i-sprint.com\/products\/universal-authentication-server-uas\/\"><span style=\"font-weight: 400;\">multi-factor authentication<\/span><\/a><span style=\"font-weight: 400;\">, where users who want access to certain data need to go through several identity verification measures before they can see it.\u00a0<\/span><\/p>\n<h3>Develop a contingency plan<\/h3>\n<p><span style=\"font-weight: 400;\">The worst has happened: your data has been hacked! What now?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To address the security breach as soon as possible, you need to provide a clear and detailed contingency plan so your employees will know exactly what to do in this situation. That means training them on whom to get in touch with and how best to inform the designated recipient.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Conversely, your IT or breach response team should also be extra alert during these periods of increased risk.\u00a0<\/span><\/p>\n<h3>Coronavirus isn\u2019t the only thing we need to worry about<\/h3>\n<p><span style=\"font-weight: 400;\">Pandemic or none, in the age of digital mobility, one of the best security precautions an organization can take is to raise awareness. While VPNs and company-issued work devices can create secure environments, companies must be vigilant in implementing extra security measures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As discussed, these include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Increase staff awareness on cybersecurity<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Step up remote access security like VPN access, <\/span><a href=\"https:\/\/www.i-sprint.com\/products\/universal-credential-manager\/\"><span style=\"font-weight: 400;\">session monitoring and recording<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Enforcing company password policies to ensure password strength<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.i-sprint.com\/products\/universal-credential-manager\/\"><span style=\"font-weight: 400;\">Managing access<\/span><\/a><span style=\"font-weight: 400;\"> to the company\u2019s databases and systems<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Reinforcing the need to set up <\/span><a href=\"https:\/\/www.i-sprint.com\/2FA\/index.html\"><span style=\"font-weight: 400;\">two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\"> to prevent unauthorized access to private information<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Especially in light of the COVID-19 pandemic, more organizations are becoming open to the idea of remote work. Amid this rapid shift in the way we work, companies need to adjust and maintain their companies\u2019 cyber defenses.\u00a0<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">i-Sprint is a leading solution provider in identity, credential, and <\/span><span style=\"font-weight: 400;\">access management<\/span><span style=\"font-weight: 400;\"> that enables organizations to create a trusted environment and optimize productivity even in the face of evolving cyber threats and identity fraud tactics. You can find more information on i-Sprint <\/span><a href=\"https:\/\/www.i-sprint.com\/about\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<\/div>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The threat of coronavirus infection has prompted organisations to take swift action\u2014employees are encouraged to stay put and work from home&#8230;..<\/p>\n","protected":false},"author":141,"featured_media":76661,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[174],"tags":[],"class_list":["post-76516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ja-2"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/76516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=76516"}],"version-history":[{"count":9,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/76516\/revisions"}],"predecessor-version":[{"id":84147,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/76516\/revisions\/84147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/76661"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=76516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=76516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=76516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}