Close this search box.

Tips for secure teleworking in the face of increasing cyber-attacks

Isbel warns of potential increase in cyber attacks and gives tips for secure teleworking

Home " Blog " Press " Tips for secure teleworking in the face of increasing cyber-attacks

Due to the spread of the COVID-19 pandemic, many companies around the world have had to resort to teleworking to carry out their tasks. For this reason, Isbel has made a series of recommendations to prevent workers from suffering cyber-attacks.


It is important that, during this shift towards teleworking, workers do not lose sight of the security of their data. At this controversial time, cybersecurity vulnerabilities may be more exposed. It is therefore necessary to adapt to the new environment as securely as possible.

Experts from Isbel, a communications technology services and solutions company, give recommendations to strengthen the security of company and end-user data.

What to do for safe teleworking?

Use of VPN

Tips for protecting company data include setting up a VPN. It is essential to use a secure connection between the technological device used by the employee and the company's network.

Dual-authenticated connections

Isbel advises setting up connections with two-factor authentication: in addition to the password, the user can - for example - receive an SMS with a code that is requested to establish the connection. This guarantees an extra level of security for teleworking.

Security systems to protect data

Since the computer, tablet or mobile phone that you work with is connected to the home wifi network, and at the same time is connected to the company's network, it is essential that security systems are installed on the devices used so that the company's network is not compromised.

At the same time, in times of teleworking, phishing attacks - a term that refers to tricking a victim into performing actions they should not, e.g. disclosing confidential information - related, for example, to news about the coronavirus, are on the rise. Cybercriminals try to exploit the fear that is present in society. It is therefore of vital importance to train users to avoid threats. It is good to create protocols that employees can follow.

Recommendations for end-users

When receiving communications from companies in order to carry out an action, it is necessary to check that the channel is the official one. To do this, for example, you can check the sender's mailbox.

It is also important not to click on or download files from unknown sources. Before clicking on a link, you can check which URL it redirects to. This can be done by hovering the cursor over the link.

During web browsing, it is possible to check whether the site uses encryption or not, which ensures to some extent that the content cannot be interpreted by third parties and therefore it is safe to enter personal data. Most browsers display a green, closed padlock icon next to the URL. If the connection is not secure, an open and usually red padlock will be displayed.

Finally, it is advisable to connect only to wifi networks that require passwords. Computers and mobile phones display the security level of the network. Most home wifi networks allow you to change the settings to use only WPA2, which is the most secure system for home networks.

Original article published in Crónicas.



Related Entries


Synchronism: from 0 to 5G

In the era of 5G, the demand for precision for telecommunications networks reaches unprecedented levels. Learn more about the synchronization universe and how we have moved towards accurate and standardized solutions such as NTP and PTP.

See more "