Home is now a new office
Since this pandemic occurs, Canadian government encouraged companies to support a remote work for employees. Pre-pandemic, nine in 10 organizations had less than 20 per cent of their workforce working remotely. COVID-19 has flipped this on its head. Now, nearly two thirds of organizations have at least 60 per cent of their workforce working remotely. According to the survey created by the Conference Board of Canada, it showed a dramatic increase in the percentage of Canadian organization’s workforce that works remotely.
Securing network is critical for your asset
When most of the organizations started the remote work, there was a great increase in the amount of hacking threats right after the Covid-19 outbreak started.
The increase in remote working calls for a greater focus on cybersecurity, because of the greater exposure to cyber risk. This is apparent, for example, from the fact that 47% of individuals fall for a phishing scam while working at home. Cyber-attackers see the pandemic as an opportunity to step up their criminal activities by exploiting the vulnerability of employees working from home and capitalizing on people’s strong interest in coronavirus-related news (e.g. malicious fake coronavirus related websites).
It is obvious that the cyber-attackers will keep trying to take precious data and information out of our companies while we work from home. This is the reason why we should have a secure network setup at home office.
There is a useful method you can use to protect your company asset while you work from home. You can access the company server through the secure private network, and you will be protected at anytime and anywhere by the company firewall if you are using this method. Here is how.
Protect your company asset: Virtual Private Network
What is Virtual Private Network?
A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments.
What kind of VPNs are there?
Here are three main types of VPN.
Often not all employees of a company have access to a company laptop they can use to work from home. During the corona crisis in Spring 2020, many companies faced the problem of not having enough equipment for their employees. In such cases, use of a private device (PC, laptop, tablet, mobile phone) is often resorted to. In this case, companies fall back on an SSL-VPN solution, which is usually implemented via a corresponding hardware box.
The prerequisite is usually an HTML-5-capable browser, which is used to call up the company’s login page. HTML-5 capable browsers are available for virtually any operating system. Access is guarded with a username and password.
A site-to-site VPN is essentially a private network designed to hide private intranets and allow users of these secure networks to access each other’s resources.
Site-to-site VPNs are mainly used in large companies. They are complex to implement and do not offer the same flexibility as SSL VPNs. However, they are the most effective way to ensure communication within and between large departments.
Connecting via a VPN client can be imagined as if you were connecting your home PC to the company with an extension cable. Employees can dial into the company network from their home office via the secure connection and act as if they were sitting in the office. However, a VPN client must first be installed and configured on the computer.
This involves the user not being connected to the internet via his own ISP, but establishing a direct connection through his/her VPN provider. This essentially shortens the tunnel phase of the VPN journey. Instead of using the VPN to create an encryption tunnel to disguise the existing internet connection, the VPN can automatically encrypt the data before it is made available to the user.
How it works?
For small companies, they use client-to-server VPN to secure their home office network.
- Users run VPN software on their workstation.
- Type in the public IP address of company’s firewall.
- Authenticate with a company firewall to use company VPN.
- The VPN acts as a secure tunnel between you and the internet. Your ISP and other third parties cannot detect this tunnel.
- Users now have an access to the company through a secure tunnel.
Benefits of using VPN
1. Protect file sharing over company network
Most of the companies have file servers, such as Windows Server 2016 and Synology NAS. They are configured on the company network, so if you wanted to access the server to get data, you need to connect to the VPN. Once you are connected, you will be able to access the company files on the server through the secure tunnel VPN.
2. Browse history and internet data flow are managed by professional IT department
Many cyber-attackers initiate the hacking by sending a phishing email or hijacking unsecure network. If you are connected to the VPN, you would not have to worry about this. The company firewall will filter malicious links and protect the connection to the Internet.
3. Company network can be access from anywhere at anytime
It is quite dangerous if you work under the public network, such as Wifi at Starbucks. If you connect to the VPN, however, you can use any public network at anytime while your workstation is protected and provisioned by your company firewall.
For more information please contact us
Phone: (604) 757-9823
Email: [email protected]
For more IT tips & information, please visit these blogs
Due to an increase of Covid-19 cases, many companies are shifting their old style of working in office to telecommuting. The importance of email emerges because of this. Not only email is a great way to communicate with consumers, but also business use email every day to reach new, existing, and future customers.
Thanks to modern technology, we use computing devices, such as desktops, laptops, smartphones, tablets, and smart watches anywhere and anytime. Mostly, these devices connect with other computing devices through the Internet to share information and utilize useful features like a mobile banking and an online shopping. All of these devices are potentially vulnerable to misuse by hackers, so it is necessary for the users to have strong passwords.