ĢTV

This is some text inside of a div block.
Glitch effect

Remote Work Security: Follow Imani’s Journey in Our Latest ĢTV SAT Episode!

Contributors:
Special thanks to our Contributors:
Glitch effectGlitch effectGlitch effect
Glitch banner

Educating Users on Remote Work Best Practices

It’s no secret that there’s been a massive spike in remote work over the past few years. But with such an abrupt change in how we do business, many organizations, especially those with small IT or security teams, struggled to keep up with the needs of a newly distributed and heavily remote workforce. Fast forward a few years, and many folks still haven’t learned or adopted the proper behaviors to protect themselves while working remotely. 

Our customers and partners have raised concerns about the challenges of remote work security and have asked us to help educate their users on best practices for better protection in remote work environments. We heard your feedback, and we’re excited to present the newest ĢTV Security Awareness Training (SAT) episode: Remote Work!

This episode follows Imani, an executive heading on a much-needed vacation. But, she’s been working on a huge deal for her company that she needs to push through while she’s traveling. Weasley, who works for a competitor, is on her flight and does everything he can to try and stop the deal from going through. Learners can follow along as Imani thwarts Weasley's attacks every step of the way while learning about the security risks of working remotely, such as:

  • Shoulder Surfing: Hackers can gather valuable information by simply looking at your screen over your shoulder in a public place, but they can also be more sophisticated by using cameras, mirrors, or other reflective surfaces. This can happen anywhere from restaurants, cafes, trains, airports, industry events, or any public space where people work remotely.
  • Unsecured Networks: Remote workers often use home or public networks that are less secure than corporate networks and can leave them vulnerable to attacks like eavesdropping or man-in-the-middle.
  • Unlocked Devices: Leaving your device unlocked and unattended in a public space is like leaving your keys in the ignition of an unattended vehicle and writing “free car” in the dust on the windshield. It gives hackers the keys to your company network. (Pro tip: You can spread awareness of this threat in a fun way with your colleagues. When they leave their unlocked devices unattended, go to their browser and send them to . )
  • Physical Security: Leaving devices unlocked or unattended, allowing strangers to peek at your laptop over your shoulder, or letting unknown people use your security badge to get into secure areas—these are all forms of physical danger that can threaten your business.

As the episode progresses, learners watch as Imani identifies and prevents these types of threats and scenarios while working remotely. In the end, your learners will better understand their role in safeguarding company data and how to protect themselves through best practices like locking their devices, checking their surroundings, and always having a healthy dose of suspicion.

Looking to level up your remote workforce’s security awareness?  Start your free trial of ĢTV SAT!

Categories
Share

Sign Up for Blog Updates

Subscribe today and you’ll be the first to know when new content hits the blog.

By submitting this form, you accept our Privacy Policy
Oops! Something went wrong while submitting the form.
ĢTV at work
ĢTV News
ĢTV News