PAGE HEADING

4 Steps to Strengthen Cybersecurity with Your Team

by by Chris R. Cicalese, CPA, MSTFP, Alloy Silverstein - December 12, 2024

In a post-pandemic world, remote work continues to be a mainstay in some form or another for employees. Unfortunately, with the increased remote workforce, there is also an increase in corporate vulnerabilities for perpetrators to exploit. These vulnerabilities often make a company s complex security setup less effective.

With a remote workforce, the added out-of-office locations also increase the number of unmanaged devices that connect to the company network. Alternatively, having an in-office workforce or supplied devices for remote work allows the technology team to reduce complexity by having a more standardized device setup. If workers are supplying their own devices, it makes it more difficult, as each device may have different software and employees may not have the same philosophy about keeping their home network or devices secure.

1. Use a Virtual Desktop

The best-case scenario when a device is not supplied by the employer would be to connect to a virtual desktop where the company can manage the data more easily and prevent it from being transferred to the employee s device. With a virtual desktop, the technology team can disable various features such as printing or connecting storage devices to help manage client confidentiality. The desktop profile can also be customized so that upper-level management and entrusted employees have more abilities than the common employee. While making it more complex, it also provides management with more flexibility to make their remote workforce more efficient.

2. Enable Multi-factor Authentication

In both a company- and employee-provided device setup, multi-factor authentication should be utilized to prevent someone from easily accessing company information if they happen to get an employee s password. An example is using an authenticator app or texting a code to be required after trying to access the system. Without the code, the user would not be able to access the files. To make it harder for passwords to get in the wrong hands, it would also be wise to require frequent password changes and complex alphanumeric passwords that also contain symbols or characters.

3. Educate Employees on Phishing Scams

While securing the devices and how the company s data is accessed is a great start, all that hard work can quickly be undone with one click of a bad link. Phishing scams have become extremely popular with the rise of remote work. Perpetrators create fake emails with masked links that will bring employees to a fake page to capture their login information or install harmful files on the network. Without proper diligence, an employee can easily fall for one of these fake emails that can cripple a company s network and reputation.

The best way to prevent employees from falling for these phishing scams is through education. An effective way is to utilize a phishing education campaign that has multiple layers to it. These layers often include an annual training, micro trainings and fake phishing emails. The annual training goes through the basics of what scams are out there and how employees can be prepared to identify bad emails. This can be part of new employee orientation initially and then included with annual training for current employees. Micro trainings can be conducted throughout the year to keep employees updated. Lastly, utilizing a fake email campaign can help identify employees who would be an easy target and enable the company to focus on educating those employees to reduce the risk that they will click a bad link.

4. Perform Penetration Testing

After getting a handle on devices and encouraging employees to pay attention to the details of emails, the next hurdle would be to test your network to see if it could get hacked. In most cases, you would utilize an independent third party from your technology services provider to ensure you get a fair look at how your systems are set up. By having a firm perform a penetration test, you can see what vulnerabilities exist in your network and what the technology team needs to focus on improving. The white-hat hackers could even use social engineering to try to get employees to provide information that otherwise would not be obtainable.

When considering the security of your client information and company network it is vital to be proactive. The potential liability from data being stolen or the network being down is not easily defined as every hack is different. It is best to get ahead of the potential loss and educate your team so that they are better prepared to identify and mitigate threats appropriately. 

Icon_MemberBenefits_MID
CPACharge
CPACharge was developed specifically for CPAs, enrolled agents and accountants, providing a simple, affordable online payment solution that allows you to securely accept credit, debit, and eCheck/ACH payments from anywhere. 
NJCPA_Icn_4C
On-Site Training

NJCPA on-site training programs offer the same outstanding content and expert instruction as our seminars but are led at your location.

Icon_3_people_circle_SKY-04
Join the Accounting Educators Community

Connect and share with other accounting educators about curriculum, trends and the profession. Learn about NJCPA initiatives that are valuable for your students including information on obtaining the CPA designation, student membership, scholarships, volunteer opportunities and events.

Icon_MemberBenefits_MID
Guaranteed Rate/Marc Demetriou
Marc Demetriou of Guaranteed Rate is offering NJCPA members a “no lender fee mortgage” ($1,440 lender fee credit), competitive low rates and a dedicated team to deliver world class service.
Icon_3_people_circle_SKY-04
Join the Women's Leadership Forum

Join our online forum that enables female CPAs at all career levels and industries to make meaningful connections with each other and discuss career goals.

Icon_MemberBenefits_MID
Wolters Kluwer
NJCPA members save 25 percent on CCH CPELink subscriptions, live webinars and on-demand self-study (mobile friendly) CPE courses.
Icon_MemberBenefits_MID
SMI

SMI has negotiated special discounts for the NJCPA members with all the major technology carriers and providers.

Icon_3_people_circle_SKY-04
Join the Business & Industry Professionals Interest Group

Stay connected to your peers and share knowledge on corporate finance topics.

Wolters Kluwer CCH
Save on COVID Tax Resources
NJCPA members save 25 percent on Wolters Kluwer's new book, COVID and Taxpayer Certainty Acts of 2020: Law, Explanation & Analysis.
NJCPA_Icn_4C
Shop the NJCPA store
Are you NJCPA proud? Purchase NJCPA merch to show your pride and help support our scholarship program.
Icon_Shooting_up_arrows_MID-03
Real Estate Classified Ads
View classified ad postings for office space for sale or rent.
Icon_Handshake_MID-03
Mergers & Acquisitions Classified Ads
View classified ad postings from CPA firms looking to be acquired and those looking to acquire or merge with other firms.
Icons_3_gears_midnight-03
Professional Services Classified Ads
View classified ad postings from companies providing services to CPAs.
Icon_3_people_circle_SKY-04
Join the Cannabis Interest Group
New Jerseyans have voted to legalize cannabis. Join the NJCPA's Cannabis Interest Group to gain information, insights and best practices for serving clients in this promising new industry.
NJCPA_Icn_4C
Zoom Backgrounds
Download our virtual backgrounds for Zoom meetings.
Icon_Magnifying_Glass_person_SKY-04
Find a CPA
Locate a CPA near you for expert help with tax preparation and managing the financial health of your business.
icon_odometer_sky-02
Career and Business
Get tools and guidance to grow your career and further your organization’s success.
Icon_Person_Center_SKY-04
Community
Connect with CPAs in New Jersey and beyond who have similar interests, challenges and opportunities as you.
Icon_lightbulb_lightening_bolt_SKY-04
Expertise
Increase your technical competence and leadership skills with cutting edge information and training.
NJCPA_Icn_4C
Find a Peer Reviewer
Search our Peer Review Directory to locate a firm to perform your peer review under the AICPA Peer Review Program.