Intelligent CISO Issue 51 | Page 69

Employers need to recognise how easy it is for staff members to accidently expose the corporate network and how it is more common than they may anticipate . www . intelligentciso . com
decrypting myths
connecting to public Wi- Fi hotspots which aren ’ t always fully secure and bad actors use as an attack method . However , the Federal Communications Commission ( FCC ) has shared some top tips on how users can best protect themselves online and recognise the validity of available Wi-Fi hotspots .
To ensure all data is fully encrypted , employees should check that all websites they are visiting start with ‘ https ’ at the beginning of the address . In addition , the FCC suggests users should adjust the settings on the device so that it does not connect to Wi-Fi networks automatically . If employees follow simple steps such as these when working from a public place , the organisation is better protecting itself from being attacked .
With many organisations implementing a hybrid working environment , BYOD culture remains a hot topic and will unlikely stop soon . Therefore , it is essential for organisations to recognise the risks at hand and ensure they are following the necessary steps to proactively prevent any breaches or malicious activity . u
Kevin Curran , IEEE Senior Member and Professor of Cybersecurity at Ulster University ensure this information is front of mind for employees , organisations should coordinate sessions on a monthly basis , depending on the size .
Enterprises that are in the process of introducing or have already introduced a BYOD policy would benefit from considering a mobile device management solution which allows for application management , security patching and updates to be performed on all enrolled mobile devices . Doing so can significantly decrease the number of potential attacks to the enterprise ’ s network .
Another challenge with BYOD and hybrid working is employees

Employers need to recognise how easy it is for staff members to accidently expose the corporate network and how it is more common than they may anticipate . www . intelligentciso . com

69