• Latest
  • Trending
5 tips to avoid cyberattacks in 2023 as a remote worker

5 tips to avoid cyberattacks in 2023 as a remote worker

July 22, 2023
Blockchain.com sets up African hub in Nigeria, seeks SEC license

Blockchain.com sets up African hub in Nigeria, seeks SEC license

October 18, 2025
Ethio Telecom introduces Znexus to close smartphones usage gap

Ethio Telecom introduces Znexus to close smartphones usage gap

October 18, 2025
African startups raised $141.7 million in September 2025

African startups raised $141.7 million in September 2025

October 17, 2025
Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

October 17, 2025
YouTube updates its user interface across all devices

YouTube updates its user interface across all devices

October 17, 2025
Tech companies dominate Interbrand’s 2025 Best Global Brands

Tech companies dominate Interbrand’s 2025 Best Global Brands

October 17, 2025
Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant in Bayelsa

Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant in Bayelsa

October 16, 2025
Spotify testing ‘SongDNA’ to show everyone behind your songs

Spotify testing ‘SongDNA’ to show everyone behind your songs

October 16, 2025
$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

October 16, 2025
Chari raises $12M, gets Morocco’s first VC-backed payment license

Chari raises $12M, gets Morocco’s first VC-backed payment license

October 16, 2025
NCBA unveils ConnectPlus to improve businesses in Kenya

NCBA unveils ConnectPlus to improve businesses in Kenya

October 16, 2025
Slack supercharges Slackbot with smarter AI capabilities

Slack supercharges Slackbot with smarter AI capabilities

October 16, 2025
Techpression
Advertisement
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
Saturday, October 18, 2025
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Tech News Africa Tech News

5 tips to avoid cyberattacks in 2023 as a remote worker

Felicia Akindurodoye by Felicia Akindurodoye
July 22, 2023
in Africa Tech News, Business, Business Strategy, Editors Pick, Entrepreneurship, Innovation, Startups, Tech News, Technology
149 1
0
5 tips to avoid cyberattacks in 2023 as a remote worker
465
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

As soon as summer arrives, working from home becomes the top option for a lot of employees, but it’s important to remember all of the potential hazards and problems that come along with relocating the office. Before the pandemic, cybersecurity had just begun to be recognised as an essential component of a company’s operations. 

But the introduction of teleworking during confinement and the hacks that many businesses faced as a result of the exposure of their equipment is truly the reasons why IT teams are increasingly focused on boosting awareness among their employees.

The goal is crystal clear: to protect every point of entry into the company network, monitor that network for any signs of active attacks, and so make working remotely a safe and convenient choice.

This modality provides a number of benefits, including flexibility and the opportunity to spend more time with family. Therefore, it should come as no surprise that many professionals decide to make use of these features throughout the summer months. 

RelatedPosts

Kenya’s banking sector loses Sh1.59 billion to hackers in 2024

Kenya’s banking sector loses Sh1.59 billion to hackers in 2024

September 11, 2025
GITEX Nigeria 2025: NITDA Signs MoU with Kaspersky to enhance Nigeria’s cybersecurity ecosystem

GITEX Nigeria 2025: NITDA Signs MoU with Kaspersky to enhance Nigeria’s cybersecurity ecosystem

September 7, 2025

WEF lists AI misinformation, cyberattacks as top concerns

January 17, 2024

How ransomware groups use remote encryption for cyberattacks

December 28, 2023
Load More

Although switching workplaces may appear straightforward from an operational standpoint, it is essential to take into account a process for all preceding actions before making the move. Experts in cybersecurity at Sophos, a global leader in innovation and delivery of cybersecurity as a service, have provided the following five procedures that should be taken in order to minimize risk and concern during a time that should be joyful and pleasurable:

Read also: Showmax moves to protect users against cyber attacks

The 5 ways

  1. The preparation is done in advance. Check to see that your devices have the appropriate security software installed and that they comply with the compliance policies and security of your organisation. Just as you must prepare your devices and materials in order to set up your office in the new location, you also cannot forget to condition them internally. The solutions have been updated and safeguarded.

 

  1. Training. The vast majority of cyberattacks begin with a vulnerability on the part of the users, who are the “weakest link in the chain.” Workers have the potential to act as the entry point via which attackers get access to the remainder of the company’s devices. Because of this, it is essential for workers to learn the fundamental knowledge necessary to stay abreast of current events and determine in a timely manner if they are coming under attack, whether at the hands of their employer or on their own accounts.

 

  1. Make sure to check again. Do not answer directly if you receive an unexpected communication from a coworker or business that seems out of the ordinary. Instead, contact the person or organisation using another mode of communication, such as phone or SMS to be sure they are who they say they are.

 

  1. Immediately put any available upgrades into effect after they become available. The easiest way to accomplish this is on our computers and phones since we are typically encouraged to update those devices; nevertheless, you should not forget to update your internet router and other smart home devices. At the very least once every three months, it is a recommended practice to check any and all of them to see whether there are any available updates.

 

  1. Don’t lose sight of the “essentials” you need to maintain. In conclusion, despite having completed all of the procedures that came before, it is imperative that we do not overlook the most fundamental forms of protection, which together constitute the barrier to entry. 

First things first, make sure each of your online accounts has its own unique password and consider using a password manager to assist you in making it longer and more secure. Whenever possible, it is best to utilise multi-factor authentication, sometimes known as “two-step” authentication, because it offers additional protection.

Google announces funding for Cyber Security training in Africa

Remarks from Sophos executives

“At the time the health emergency arose, companies had to apply various measures to continue operating from home, but, although the crisis passed and companies returned to normality, teleworking has remained in many cases. In the first instance, it is the companies that are taking measures to increase their levels of cyber protection, but in addition to that, users can also take measures that accompany them and that allow them to telework from wherever they want while maintaining protection”, Chester Wisniewski, Field Sophos CTO.said.

“Today most devices are used when connected to the internet, so you have to maintain a mindset where devices are considered to be in a hostile environment at all times. The idea that the safe space is inside offices and the insecure one outside is outdated. Now, anywhere you can suffer an attack, but it is true that sometimes when we move along with our workplace we do not take the necessary tools with us, so it is important to be vigilant” he added.

Tags: cyberattacksremote worker
Felicia Akindurodoye

Felicia Akindurodoye

Felicia Akindurodoye is an experienced writer and researcher, whose watchword is originality.

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business
  • Home
  • About
  • Contact Us
  • Advert Rate
  • Terms & Conditions
  • Privacy Policy
  • SiteMap

© 2025 Techpression

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.