Before vacations, companies should review plans for software updates of their systems and ensure that the organization's website will work. All this is necessary to avoid surprises while the employees responsible for IT matters are on vacation.
"It goes without saying that software and anti-virus programs must be updated in all circumstances. Outside the office, instead of a public and unsecured Wi-Fi network, you must use either mobile data or a VPN connection, which does not allow strangers to monitor internet traffic," Kukk says. It is also wise to encrypt your laptop hard drive. Screen lock, encryption and remote management must be used on the phone so that, if necessary, the location of the device can be detected or its contents remotely deleted to prevent data leakage.
When logging in to your computer on an airplane, in a hotel lobby or some other public place, it is worth considering whether the documents to be opened and visible on the screen should be hidden from prying eyes. A screen filter helps hide content from others. "Also, it is not wise to leave your laptop unattended. Even if you only need to leave the computer for a moment, the screen lock opened with a code or your fingerprint must be turned on," the KPMG expert adds.
You should always treat links sent via email with caution. Most of us have come across threatening emails seemingly sent by "Estonian police" or well-known companies, the purpose of which is phishing or a ransomware attack. Unfortunately, time and again, we hear about cases where the recipient of an email has taken the bait of fraudsters.
Head of Cyber Security
mihkelkukk@kpmg.com
+372 521 4332
IT or cyber security training is more engaging when delivered by trainers who a..
When planning your cyber defence strategy, it’s crucial to recognise that vulne..
The escalating complexity and frequency of cyberattacks pose a critical risk to the stability of f..
According to The Forrester Wave: Cybersecurity Consulting Services in Europe, Q1 2024.
We are excit..
It is a volatile time for economy, which always leads to businesses being purchased and sold. For ..
Provide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.
Analysis of employee awareness focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.