Telework safety audit
Is your company really ready to work remotely?
The rapid implementation of teleworking due to COVID-19 has caused new vulnerabilities that cybercriminals are using to attack organizations.
What is cybersecurity auditing in telework?
Even if the company is protected in its common environment, the implementation of teleworking can lead to new situations and changes, which open breaches and vulnerabilities that attackers take advantage of.
To protect organizations in this new environment, we have launched the cybersecurity audit specifically for telework, which adapts services to quickly assess telework security and implement measures to address it.


How are cyber-attacks on telework?
Cybercriminals are already taking advantage of the current situation to launch attacks focused on telework. They use a wide variety of methods, from accessing systems with insecure passwords or passwords stolen by other means, to capturing traffic passing over insecure WiFi networks.
In addition, the current concern about the Coronavirus is generating many phishing campaigns with which they get users to download the guard attracted by curiosity.
What analysis does telework security auditing do?
Secure authentication systems
~
Encrypted connections from any location
Adapting security settings for teleworking
Evaluation of device encryption
U
Intrusion detection system
Device security
The point: train your employees in cybersecurity for teleworking
We continually see companies that are very well protected being hit by a successful cyber-attack because of inadequate employee training.
To prevent employees from becoming the weak link in the cybersecurity chain, it is necessary that they know the risks to which they are exposed and how to act. That is why we are providing specific training on cybersecurity in teleworking, teaching employees how to act in this new environment.

Other types of audits
Pentest
A pentest consists on a computer security audit in which the company’s systems are attacked through the different breaches detected, analyzing the extent to which a real attacker could access.
Source Code Audit
In a Source Code Audit we evaluate the degree of security of the source code of the applications used or developed by your company in search of vulnerabilities that could be exploited by attackers.
Social Engineering Audit
The purpose of this audit is to obtain confidential information from the company’s own employees without them knowing that they are compromising the company.