Cyber security
22.12 2023

Cyber Security Expert: IT Hygiene Should Not Be Neglected During Holidays and Vacations

The line blurring between work and spare time, and the widespread use of remote work mean that people sometimes log in to their computers even during holidays and vacations. Mihkel Kukk, Head of Cyber Security Services at KPMG, points out that especially business users must take into account the risks associated with working outside the office.

Before vacations, companies should review plans for software updates of their systems and ensure that the organization's website will work. All this is necessary to avoid surprises while the employees responsible for IT matters are on vacation.

"It goes without saying that software and anti-virus programs must be updated in all circumstances. Outside the office, instead of a public and unsecured Wi-Fi network, you must use either mobile data or a VPN connection, which does not allow strangers to monitor internet traffic," Kukk says. It is also wise to encrypt your laptop hard drive. Screen lock, encryption and remote management must be used on the phone so that, if necessary, the location of the device can be detected or its contents remotely deleted to prevent data leakage.

Based on international studies done by KPMG, 90 percent of companies have faced at least one cyber attack, and 26 percent of those incidents forced companies to suspend their operations temporarily.

When logging in to your computer on an airplane, in a hotel lobby or some other public place, it is worth considering whether the documents to be opened and visible on the screen should be hidden from prying eyes. A screen filter helps hide content from others. "Also, it is not wise to leave your laptop unattended. Even if you only need to leave the computer for a moment, the screen lock opened with a code or your fingerprint must be turned on," the KPMG expert adds.

You should always treat links sent via email with caution. Most of us have come across threatening emails seemingly sent by "Estonian police" or well-known companies, the purpose of which is phishing or a ransomware attack. Unfortunately, time and again, we hear about cases where the recipient of an email has taken the bait of fraudsters.

Mihkel Kukk

Head of Cyber Security
mihkelkukk@kpmg.com
+372 521 4332

A Company Must Not Be Bought Without a Pre-transaction IT Audit

It is a volatile time for economy, which always leads to businesses being purchased and sold. For ..

Cyber security

How To Prepare for Overcoming a Cyber Incident

It is no longer a question of if cyber incidents take place, but when they will take place. Based ..

Cyber security

Too Many Companies Underestimate IT Risks

Mihkel Kukk, Head of Cyber Security Services at KPMG, notes that, although great importance is att..

Cyber security

KPMG Cyber Security Expert: Chief Information Security Officers (CISOs) Play a Key Role in Combining Business and Information Security Objectives

"Not dealing with information security should not be seen as an IT risk, but rather as a strategic..

Cyber security

KPMG: artificial intelligence cannot replace a doctor

Mihkel Kukk, Head of Cyber Security Services at KPMG, says that artificial intelligence cannot rep..

Artificial Intelligence

Provide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.

KPMG Baltics OÜ

+372 626 8700
cyber@kpmg.ee
Narva mnt 5, 10117 Tallinn, Estonia
${item.title}
KPMG Baltics KPMG Global Privaatsuspoliitika
KPMG IT Audit
Oma veebilehel kasutame küpsiseid. Küpsised aitavad analüüsida veebiliiklust ning annavad meile statistilist teavet.
Email again:

HR assessment 

HR assessment focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.

Email again:

Threat assessment

Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.

Email again:

Maturity assessment

Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.

Email again: