Mitigation – Important

  1. multi-factor authentication
  2. automatic session timeouts and
  3. access monitoring
  4. Unauthorized access to devices

Any machine that is capable of connecting to your network should be protected using multi-factor authentication, automatic session timeouts, and access monitoring to prevent unauthorized users from getting into the data, even if they have the device.

Phishing

Anti Phishing training and make verifying messages a normal practice

Unauthorized apps

In addition, implementing single sign-on technology can help IT security teams control access and set security permissions across multiple applications.

Unsecured Home networks

Many home internet users don’t even secure their networks with basic password protection.

Also read – Work from Home Laptop Options