Before vacations, companies should review plans for software updates of their systems and ensure that the organization's website will work. All this is necessary to avoid surprises while the employees responsible for IT matters are on vacation.
"It goes without saying that software and anti-virus programs must be updated in all circumstances. Outside the office, instead of a public and unsecured Wi-Fi network, you must use either mobile data or a VPN connection, which does not allow strangers to monitor internet traffic," Kukk says. It is also wise to encrypt your laptop hard drive. Screen lock, encryption and remote management must be used on the phone so that, if necessary, the location of the device can be detected or its contents remotely deleted to prevent data leakage.
When logging in to your computer on an airplane, in a hotel lobby or some other public place, it is worth considering whether the documents to be opened and visible on the screen should be hidden from prying eyes. A screen filter helps hide content from others. "Also, it is not wise to leave your laptop unattended. Even if you only need to leave the computer for a moment, the screen lock opened with a code or your fingerprint must be turned on," the KPMG expert adds.
You should always treat links sent via email with caution. Most of us have come across threatening emails seemingly sent by "Estonian police" or well-known companies, the purpose of which is phishing or a ransomware attack. Unfortunately, time and again, we hear about cases where the recipient of an email has taken the bait of fraudsters.
Head of Cyber Security
+372 521 4332
It is a volatile time for economy, which always leads to businesses being purchased and sold. For ..
It is no longer a question of if cyber incidents take place, but when they will take place. Based ..
Mihkel Kukk, Head of Cyber Security Services at KPMG, notes that, although great importance is att..
"Not dealing with information security should not be seen as an IT risk, but rather as a strategic..
Mihkel Kukk, Head of Cyber Security Services at KPMG, says that artificial intelligence cannot rep..
Provide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.
HR assessment focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.