Audit: The more applications being used (on a laptop, smartphone or tablet), the bigger the attack surface. The first thing to do is audit: Take a look at all those apps that are rarely (if ever) used, and remove them. This decreases a hacker’s ability to take over a device or steal credentials. It’s especially important for mobile devices, where some apps have excessive permissions that can increase vulnerability.
Baseline Security: Malicious actors always look for easy ways to attack remote workers; for example, through spam or malware delivered via email. Install and activate all baseline security solutions for all devices. This includes anti-spam, anti-malware and anti-virus. Check to be certain applications are configured for automatic updates.
If a device does not use a VPN, equip it with one. This will protect any data it sends and receives. A VPN creates a secure tunnel between a home office and a government network or internet site, preventing criminals from watching any online activity. This is especially relevant when accessing sites that contain sensitive information, such as online banking or brokerage sites. Cisco Firepower VPN, for instance, can help protect all private information.
Continuous Updating: Hackers are vigilant when it comes to learning about vulnerabilities in applications, browsers and operating systems, and they quickly exploit those vulnerabilities. Update devices with the latest patches for everything. Don’t ignore notifications for new versions or assume it will be done later — do it now.
Installing the latest updates will help patch recently detected security flaws and provide new capabilities. It’s especially important to update mobile devices, where notifications can be less obvious. Check all apps periodically, and install the latest updates to ensure the strongest protection.