Hands typing on a laptop with a graphic of a padlock and lines and nodes representing a network

Data Loss Prevention in Our Remote Working World

#KingstonCognate Introduces Tomasz Surdyk

Photo of Tomasz Surdyk

Information security, personal data, and cybersecurity expert.

With over 24 years' experience in IT security within governments, Tomasz is a leading figure when it comes to information security, personal data and cybersecurity. In the past, he has inspected ICT systems and networks that process classified information and personal data in government administration. He has security clearance at NATO and the EU.

For several years, he has been the owner of a company specializing in the implementation of secure solutions for increasing the security of business information and personal data. As part of this role, he has been carrying out audit activities in various public and private entities throughout EU countries. Furthermore, he is an accomplished advisor in the field of personal data protection, information security, identity theft, cybersecurity and banking secrecy. He was one of the first experts to implement personal data protection in the Polish police.

Risks that come with working remotely

Technological progress and access to the internet have increased the dangers that await users working remotely. When using the internet, you should beware of the different traps that may lead to loss or business information theft.

Employees who work remotely are exposed to greater risks than employees who work at the company's premises. The implementation of appropriate procedures and increasing the level of security will minimize the risks that arise from working remotely. Most employees who work remotely are connected to home network infrastructures that are not verified by IT specialists in terms of ensuring security. Failure to provide adequate security makes it easier to break into the network with corporate devices. It happens when employees use untrusted devices. This allows hackers to eavesdrop and intercept information that is usually unencrypted. That is why it is so important to ensure employees connect safely to the home network. Employees working remotely should connect via VPN, and the IT equipment they use should have the latest operating system and updated antivirus software.

Are business laptops secure?

Hands typing on a laptop with a graphic of padlocks floating in front of the screen

Company computers used by employees should have minimum security levels implemented by IT specialists. These levels include, but are not limited to, an up-to-date operating system, two-factor authentication(2FA) to the system, the use of antivirus software, and additional security for company e-mail accounts. Additionally, business computers should be equipped with encrypted SSDs, and each employee should also use encrypted USB drives. Such solutions will allow the safe storage of data processed by employees while working remotely. Thanks to the implementation of encrypted USB drives and hardware-encrypted SSD solutions, the data is secure while offering immediate access. Data stored on encrypted USB storage devices and encrypted SSD drives is automatically protected. In the event of data theft, it cannot be accessed by unauthorized people. Enterprise set-up allows IT admins to remotely wipe the data on the encrypted USB or encrypted SSDs.

Preventing the risks

The greater the number of additional security measures, the less likely it is for hackers to breach security. Another important security feature is a firewall that protects your device from external threats. It allows you to prevent viruses or leaks of the information being processed.

When using websites, it is necessary to pay attention to different kinds of internet-based threats.

  • DoS and DDoS attacks - Where access to a website or online store is most often hindered.
  • Phishing - Most of our website access data is phished. Fraud may apply in the case of other information, such as personal data, payment card details, bank login details, or access to mailboxes.
  • Spam - Various types of messages about the latest offers, products, and promotions from different companies. While the consequence in this case is primarily irritation, there are also emails that seemingly look normal, but contain hidden or invalid links that could lead to phishing or virus-infected sites where malware and ransomware attacks can be executed.
  • Redirecting - Being redirected to other sites where hackers break security and add a redirect to other dangerous websites.

The use of DLP software in conjunction with VPNs, encrypted SSDs, and USBs will help mitigate risks when it comes to data. But the greatest risk is on a human level, so training is also a key part of protecting your data.

Ask an Expert

Kingston can offer you an independent opinion on whether the configuration you’re currently using, or planning to use is right for your organisation.

Self-encrypted SSDs

We offer advice on what benefits SSDs will bring to your specific storage environment and which SSD is most suitable for your mobile workforce to ensure you are working securely on the go.

Ask an SSD Expert

Encrypted USB Drives

We offer advice on what benefits using Encrypted USB will bring to your organisation & which drive is best suited to your business needs.

Ask a USB Expert

Learn more about Kingston’s line of Encrypted storage solutions

Related Articles