The COVID-19 crisis has forced many organizations and businesses to work from home. Are you aware of the cybersecurity risks to your business with your employees working remotely?
As we shift to working from home you’re business has to face new challenges. Verifying the legitimacy of a potential phishing email is not as easy as it once was with new techniques being deployed daily.
How are your computers being managed? Is your data safe? Have you talked about cybersecurity with your staff? COVID-19 is not going away any time soon, its going to pose new risks and challenges for all.
This is the second in our Video Blog series on COVID-19 scams. If you need help with your business and or cybersecurity advice call us and we will be happy to help!
Video Blog
Along with that we have come out with several new guides to keep your team safe and productive. A flyer to distribute to your staff so they are in the know on potential scams and a best practices work from home IT checklist. Both available for free below. We hope you make good use of these resources and reach out if we can be of assistance!

Download the PDF version here.
Download the PDF version here.
If you like our resources please share this page on Facebook, LinkedIn or Twitter with a business that may be struggling or need help. We are offering free 1 hour complimentary checkups for cybersecurity posture to any company that needs a little free advice in these difficult times.
Also please subscribe and follow for more videos, guides, tips and tricks!
Related Posts
Download our White Paper - Cybersecurity Training 101 For Small Businesses
What is social engineering and am I affected? Simply speaking, there is more to cybersecurity than computers and how they work. This statement includes how your network is setup or even how...
Download our White Paper - Cybersecurity Risk Assessments For Small Businesses
What is the goal of a risk assessment? The goal of a security risk assessment is to define the appropriate safeguards that your company will need to implement in order to align...
Download our CMMC White Paper and learn what CMMC means for your small business.
The DoD implemented requirements for safeguarding CUI information and cyber incidents through the release of Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 in October 2016. The DFARS directed DoD Contractors to self-attest...
Guidelines for OCR enforcement discretion for telehealth remote communications
The use of electronic information and telecommunications technologies to support and promote long-distance clinical health care, patient and professional health-related education, and public health and health administration. Technologies include videoconferencing, the internet,...
31 Cybersecurity Awareness Tips for 2020
And so we believe that by raising awareness of these vulnerabilities and educating the public on how to keep themselves safe, we can take steps towards an internet that is safe from...
Remote Work Guide Do's and Dont's
Do’s Read & Acknowledge your company’s remote work and bring your own device (BYOD) policies and procedures Avoid using your personal device for work and restrict the use of company issued devices...
COVID19 Protect Your Small Business Data
Cybercriminals are aware in the interest in these subjects and are crafting malicious emails designed to infect your computer or steal information.