In this section you can find some important resources to help you stay productive and safe during the COVID-19 pandemic. SSS has had a staff member test positive for COVID-19. Please read our statement below.
- SSS articles on the measures we have taken and security advice
- Free SigningHub e-signature pack up for grabs
- National Cyber Security Centre - Working Remotely: Advice for Organisations and Staff
- National Institute of Standards and Technology (NIST) Guide to Telework and BYOD Security
- Create a secure work from home strategy
- 5 Best Practices for Safe and Secure Remote work
- Protect Your Personal Devices - Free Download
- Existing clients: A Guide To Enable VPN Capabilities On Your Sophos Firewall
- COVID-19 phishing, spam, and malicious campaigns
SSS has had a staff member test positive for COVID-19
We are being as transparent as we can in the interest of our relationship with our clients and in the wider interests of the health of New Zealand.
We have been in touch with all staff and clients that are at risk.
Those people have been registered with the Regional Public Health agency and were in isolation for 14 days from last contact with the affected individual.
All other staff were being informed to monitor themselves for symptoms for 14 days from the time that the affected staff member was in the office, and call Healthline on 0800 611 116 if symptoms appear. We are happy to say that no other staff developed symptoms.
Given the practices we employed throughout the COVID-19 pandemic prior to the Alert Level 4 lockdown we believe that the virus hasn't had the chance to spread beyond the close contact group.
Our staff member, whose symptoms were minor, remained in good spirits and has recovered at home.
In making this public, the key message we want to give is - take notice and take action.
For weeks prior to this event our measures have been in conformance with, and generally exceeding, the government guidelines at the time to ensure that our staff and our customers are not adversely affected by COVID-19 including;
- instituting a quarantine period for international travellers as deemed necessary based on exposure risk (this was in place weeks prior to the 14 day isolation required by Government),
- the deployment of hand sanitiser throughout the organisation for personal (at home) and business use,
- extra wipe down cleaning and the provision of wipe down materials in meeting rooms,
- maintaining space between employees in our various offices,
- staff that may have a heightened susceptibility to COVID-19 (due to age, heart condition, breathing difficulty, compromised immune system) were identified and risk management provisions instituted,
- immediate self quarantine (and working from home) for those affected by any illness,
- enhanced information dissemination, and clarifying expectations of staff behaviour regarding; good hygiene practices, international travel (personal), meetings with external parties, public functions, quarantine procedures, and working from home,
- cancelling all business related international travel, and all domestic travel,
- we have now cancelled all face-to-face meetings with clients and suppliers and had greatly reduced these previously, and
- As a precaution, we now have all staff working from home until further notice (increasing from over 50% of staff that were working from home previously).
As you can see, our response has been comprehensive covering both direct and indirect threats of COVID-19.
Even with comprehensive measures in place early, we were still not able to contain the risk that COVID-19 presents.
We strongly urge all of you to take action and have staff work from home if at all possible.
If you have questions or concerns, please email our General Manager - Ashton.Jones@sss.co.nz
We have recently published the measures we are taking to the COVID-19 pandemic and offered some security advice. You can read the article here. If you have any questions or concerns you can contact us on 0800 777 001. We are also publishing updates on our LinkedIn page.
Empower your staff to work securely from home
Our partner Ascertia is offering any affected organisation a free 2,500 e-signature pack to be used by all employees on their SigningHub cloud service. This will help you continue some aspects of running your business during this time. Read their blog article here.
NCSC has observed an increase in malicious cyber activity surrounding COVID-19. Remote access solutions may be specific targets of cyber criminals and other hostile actors. Read this article with their advice for organisations and staff.
NIST published this guide to provide practical, real-world recommendations for securing telework computers' operating systems and applications as well as ohme networks that the computers use. It presents recommendations for securing mobile devices used for telework and advice on protecting the information stored on telework computers and removable data. You can download the document here or by clicking on the image below.
Entrust Datacard shares this article on how to quickly, securely, and flexibly implement an all-encompassing work-from-home (WFH) policy. Read the article here.
Swimlane shared an article discussing some of the risks for you to be aware of when you have staff working from home and what they recommend you can do to mitigate these. Read the article here.
You and your staff can protect your personal devices for free. Download Sophos Home here.
If you are an existing client with a Sophos Firewall, this guide will help you enable VPN so your users can securely work from home. If you need assistance enabling your VPN, you can contact our support team on 0800 777 001.
CERT NZ reports that attackers are using COVID-19 themed scams. Read more about specific text message scams, phishing emails claiming to have updated COVID-19 information, and fake coronavirus maps containing malware.
Sophos shared this video on a very specific phishing campaign appearing to come from the World Health Organization. Watch this video to find out what to look out for, and some other tips on what to do if you did become a victim of a phishing attack.