Working safely in the home office

Our way of working has been turned upside down by the coronavirus. Companies had to offer their employees opportunities to work from home in the home office within a very short period of time. It was not only challenges to provide the necessary infrastructure. But it was not uncommon for the necessary security precautions to be neglected. Thanks to Home Office, productivity can be maintained as much as possible. But the new way of working is vulnerable to hackers who want to profit from the current situation.

Hackers attacks

It has been increasingly detected that hackers are launching attacks on employees’ computers as well as the servers of the companies. With the aim of accessing sensitive data and so-called data mining. This data is then illegally resold. One of the ways the hackers use is via the azoRult claims software, which shows coronavirus cases on a map.

(Source: Reasonsecurity –

The software exploits the fear of the population. In the background, the software collects user information, cookies, usernames, passwords, keys and wallets about cryptocurrencies and more. It is therefore necessary to take extreme care which pages are visited and which e-mails are opened. 

In order to prevent such attacks, we have listed tips here, which can be implemented quickly and efficiently.

Measures for employers during home office

  • Send e-mails to employees and ask them to be especially careful about phishing emails. There are currently more AND more COVID-19 phishing mails on the way.
  • Clearly define which software (Outlook, Skype for Business, Teams, Zoom, Slack, Cloud Solutions) can be used.
  • Ensure that critical company data can only be retrieved via VPN (Virtual Private Network) or SSL encryption.
  • Introducing 2FA (Two Factor Authentication) or Multi-FA to uniquely identify employees.
  • Perform an extra data backup and ask employees to store and store their processed data correctly in the cloud / server. Additional steps may be required.

Measures for employees

  • Only use official software and avoid downloading software as much as possible at this time.
  • Check if emails are phishing emails. The sender’s e-mail address usually provides help.
  • Avoid, as far as possible, avoiding websites related to the corona virus. This does not apply to official news or the WHO website. Many of these claims software is distributed through such websites.
  • Changing passwords and increasing the complexity of passwords with e.g. Special characters.


Up to two-factor authentication, these measures are easy to implement and help to make working more secure lynotal without large additional costs. After the crisis, however, it would be important to develop a concept that makes working in the home officer safer and more efficient. If a second and third wave of the coronavirus occurs during the year, you can switch faster.

We are happy to help them drive the digital transformation in their company and advise them on strategy issues.



The increase in the use of technology in all areas of life has also led to a sharp increase in cyber crime. In Industry 4.0 you work in a network and is always available. The data will become part of the core business. In addition to new market opportunities, this change also entails new security risks. Targeted cyber attacks with the goal of getting money or company secrets are increasing rapidly. Akana supports companies and organizations in all industries in implementing a successful IT security strategy. Our experienced consultants also actively support the implementation of IT security measures so that your company is well protected.


The corona pandemic has digitized our everyday life. In response to the pandemic and to shape their digital future, companies are increasingly using the advantages of cloud infrastructures such as Amazon Web Service, Microsoft Azure, Google Cloud, Alibaba, IBM or Oracle. But what is a “cloud”? What are the advantages for companies? And what do companies have to consider in the area of security and data protection? An analysis.

Element, WhatsApp, Threema, Signal, Telegram, Vibr, Wickr Me and Wire are not rock bands or fashion labels, they are instant messengers that enable the immediate exchange of text, video or voice messages with one or more recipients over the Internet. Thanks to smartphones, these messengers became extremely popular in a private as well as business context, since they allow data sharing in no time. The announcement of WhatsApp at the beginning of this year that the terms of use will be updated, moved data protection and the security of messengers to the fore. But what does this mean for WhatsApp users? How secure are messengers in general? And how are the messages securely stored and transmitted? This article compares four popular messengers – WhatsApp, Threema, Signal, and Telegram – to answer these questions.[1]-[3]

Identity and access management (IAM) is the discipline to enable the right individuals to access the right IT resources, such as systems applications, files, and networks, at the right time for the right reasons. This often needs to be enabled across diverse technologies and the resulting processes must meet the security policies of the organization. The IAM system is a critical part of IT infrastructure of any larger organization.


Our IT security expert Michael Fedier talks about the 7 steps to take your IT security to the next level and how we do IT security consulting at Akana.

Two-factor authentication (2FA) –or multi-factor authentication (MFA) in general – has grown in importance in security in recent years. This is about how users (employees and customers) authenticate to systems. Authentication by username and password is called 1FA. However, in order to increase safety, 2FA or MFA has been increasingly used in recent years.

Share with Others
Share on facebook
Share on twitter
Share on linkedin
Share on xing
Share on pinterest
Share on email
Share on print