NCSC launches cyber attack exercise for remote workers
The new resilience exercise treats cyber attacks like a fire drill
The ‘Home and Remote Working’ exercise is the latest addition to the NCSC’s Exercise in a Box toolkit, which was launched last year in an effort to help SMBs carry out drills for potential cyber attacks.
Just like the other exercises from the toolkit, ‘Home and Remote Working’ provides employees with a realistic scenario and allows them to practise and improve their response in order to ensure that they are prepared despite working from home, often on personal computers and networks.
Sarah Lyons, NCSC deputy director for Economy and Society Engagement, urged business leaders “to treat Exercise in a Box in the same way they do their regular fire drills”.
“Doing so will help reduce the chances of falling victim to future cyber attacks,” she added. “We know that businesses want to do all they can to keep themselves and their staff safe while home working continues, and using Exercise in a Box is an excellent way to do that.”
Jonathan Miles, head of Strategic Intelligence and Security Research at Mimecast, called the new tool “a fantastic measure”, adding that it “will be welcomed universally as the threat of cyber attack continues to rise”.
“In fact, our State of Email Security shows that 91% of UK organisations believe their organisation volume of web and email spoofing will increase in the coming year, while 59% of UK organisations have observed an increase in phishing attacks over the last year," he said.
Putting a spotlight on cyber security
An examination of the current cyber security landscapeDownload now
"It’s important that organisations prioritise cyber security, especially at a time where remote working has become the norm and connecting corporate devices via the home router becomes commonplace.
"This provides greater opportunity for malicious actors to infiltrate and obtain sensitive corporate data through unsecured home devices, so it’s important that businesses educate their staff on the tell tales signs of compromise and the benefits of good cyber hygiene practices".
Unleashing the power of AI initiatives with the right infrastructure
What key infrastructure requirements are needed to implement AI effectively?Download now
Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey
A Veritas webinar on implementing a hybrid multi-cloud strategyDownload now
A buyer’s guide for cloud-based phone solutions
Finding the right phone system for your modern businessDownload now
The workers' experience report
How technology can spark motivation, enhance productivity and strengthen securityDownload now