fbpx

WORKING FROM HOME

Employees at home are exposed to cyber attacks

The attackers now focus on attacking the employees’ computers at home

A secure line to the company does not solve the problem of infected computers at home

WORKING FROM HOME

Employees at home are exposed to cyber attacks

The attackers now focus on attacking the employees’ computers at home

A secure line to the company does not solve the problem of infected computers at home

An infected employee’s computer with Cyber 2.0 installed, keeps working normally, but Cyber 2.0 will prevent malicious software and cyber-attacks from spreading in the organizational network

The IT manager is not required to do anything at all

Employees continue to maintain their privacy

Cyber 2.0 supports the European GDPR standard

CONFIGURATION:

  • Cloud-based services or internal Cyber 2.0 server
  • A cloud-based agent on all employees’ computers

EMPLOYEES WORKING FROM HOME

The main solution for employees working from home is a secure line which guarantees that only those approved by the organization can connect to it. However, if the employee’s computer at home is attacked, the secure line will not be useful as it will still allow the (authorized) employee to connect to the organization. Hackers take advantage of the fact that the home computers of the employees are not protected, and they focus their attempts on penetrating the organization through them.

The Cyber 2.0 system provides complete blocking against the spread of cyber-attacks and malicious software.

The employee’s computer continues working, but malware that has infiltrated the computer in the employee’s home, will not be able to connect to the organization, and the IT manager is not required to do any activity either. The system also provides monitoring of computers that are outside the company, malicious applications that infiltrated the employee’s computers and cyber-attacks against the company, so it allows the IT manager (if he wants) to help the company’s employees clean their computers from malicious applications and spyware. The deployment of the system is simple, because it’s via cloud services and it interfaces with existing remote systems in a transparent way, making no changes in configuration or its work methods. All Cyber 2.0 activities are done in accordance with GDPR standards, without invading the employees’ privacy and no personal information is collected. Cyber 2.0 also protects employees from home in organizations that have not installed a secure line at all. Cyber 2.0 recently put its system to the test of international hackers. Thousands of hackers simultaneously attacked the system from home, over half a million attacks, and simulated the status of an infected computer connected to their organization. None of them were able to hack the system or damage it.

NETWORK DESIGN

network-design

DOWNLOAD CLOUD AGENT