Remote Work & Travel – Security Brief

Jun 5, 2023

Traveling always takes us from our secure and comfort zone and might raise the level of risks we are facing on a day-to-day basis or it might create new risks we haven’t faced before.

The goal – keeping your company’s data & assets safe

The main risks we are facing on day-to-day basis:

  1. Assets and devices lost/stolen – can be a file, laptop, notebook, key, ID card, etc.
  2. Malware Attacks
  3. Credential Theft

It’s our responsibility to be vigilant and prepare ourselves for the whole travel phases and be proactive. Ask yourself – what can I do to protect my data?

Prior to your trip

  • Take only the equipment your need
  • Backup important data
  • Update your manager and the security regarding your destination and contact details
  • Consult with the IT team regarding the Bitlocker and 2FA
  • Make sure MFA is activated on all of your accounts – Use Non-SMS-based 2FA

During the trip

  • Keep an eye on your belongings
  • Don’t leave your assets unattended – keep your laptop with you at all times (with you on the flight)
  • Connect only to secure / known networks
  • Be suspicious of email & messages you get
  • External hard drives and devices are prohibited for use
  • Do not log in to Sirma’s applications/ environment from a non-company issues computer
  • Don’t talk publicly about work related issued

Returning home

  • Be alert to any strange activity in your account applications
  • Pay attention to unfamiliar email senders – clean your email inbox step by step
  • Report any issues that occurred during the trip

You may also find interesting…

5 Tips for SOC Analysts to Monitor and Mitigate Threats

5 Tips for SOC Analysts to Monitor and Mitigate Threats

Monitoring has a pivotal role in safeguarding your organization's digital assets. While building a fully equipped SOC may present challenges for many companies, there are fundamental practices that can significantly enhance your capabilities. In this article, I'll...

AI and Machine Learning in Cyber Security Operations

AI and Machine Learning in Cyber Security Operations

We often say that the cyber security landscape is always changing, and threats are constantly evolving. Over the last year, those statements have been widely confirmed by the rise of consumer AI tools, which allow users to create content just by text commands. Just at...

Threat Detection and Modern Response Methods

Threat Detection and Modern Response Methods

Keeping your business secure often relies on two main factors – how you detect threats and how you respond to them. In order to protect your assets, you need to have very specific answers to both of those questions. While using several predefined methods was enough...