Cyber security when working remotely and on holiday: how to protect yourself from cyber threats?
Cyber security is key not only when surfing the internet in your free time, but also at work. Company computers, mobile phones, tablets and other devices contain a lot of valuable information that could be easily misused by unauthorized persons. How can you protect yourself against cyber threats and what to look out for?

In the article you will learn:
What is cyber security?
Cyber security refers to the protection of networks, systems and programs from various cyber attacks by hackers. These often seek to gain access to sensitive data, which they then alter, destroy or use to blackmail victims. Maintaining cybersecurity today is increasingly challenging. This is mainly due to the ever-increasing number of threats, which are improving and can often break through multiple security measures. To successfully fight against attacks, organizations and businesses should focus on the following three areas:
- People – everyone in society must respect the basic principles of data protection and privacy. This means that colleagues, supervisors and subordinates should use strong passwords and avoid opening suspicious attachments in emails.
- Processes – No business should lack a procedure or framework to apply in the event of a cyber attack. The same goes for situations where sensitive data is leaked from facilities.
- Technology – Companies must have advanced technology to protect their devices. Antivirus and firewalls are key, but VPNs are also important when working remotely.

The three pillars of cybersecurity
Cyber security rests on three fundamental pillars, which are referred to by the acronym CIA:
- Confidentiality – in practice, this means that only authorized persons have access to work files, data, accounts and passwords and that they protect this information from third parties and do not pass it to someone else. This pillar uses techniques such as encryption or password authentication of users.
- Integrity – ensures that files are accurate, consistent and will not be modified in your absence. This pillar focuses on preventing tampering or technical errors that could lead to data deletion or alteration. Various techniques are used to ensure integrity, such as digital signatures.
- Access – sometimes referred to as availability. Its role is to ensure that authorised persons have access to information and programs whenever they need it, even in the event of unexpected situations such as cyber-attacks or technical failures. The availability pillar ensures, for example, that data is backed up to a secure cloud.
Cyber security is weaker when working remotely
Working remotely, whether you’re at home, in a coffee shop, or on vacation, significantly weakens a company’s cyber security. This is mainly because employees working remotely don’t have the same level of protection as those who are located directly in the office. Other factors also weaken cyber security. The first is the use of public Wi-Fi networks, which are unprotected and vulnerable, putting all connected users at risk. Another problem is the use of personal devices. Some employees work better on them and therefore refuse employer-provided laptops or mobile phones. However, these personal devices may not meet the necessary security standards, putting company data at risk. In addition, personal devices are not checked by professional technicians, so they may contain dangerous software or a virus.
Cyber security attacks and threats
Staying safe online (check out our article about internet safety tips) and avoiding cyber-attacks is challenging, but not impossible. You just need to know what threats you might encounter when browsing the web. Some of the most prevalent cyber attacks and threats today include:
- Malware – at first glance, it looks like a trusted program or file that, once downloaded, gains access to your computer, mobile, tablet or other device and all your data. The biggest problem with malware is that it doesn’t just affect one computer, it affects the whole network. Malware you’ve probably heard of includes Trojans, worms or spyware.
- Ransomware – is a type of malware that works on the principle of extortion. The attacker threatens the attacked person by destroying the files or sending them out until they pay the ransom.
- DDoS – In this attack, multiple infected systems disrupt the use of programs or the entire device by opening different windows or displaying a large number of ads on the screen.
- XSS (Cross-Site Scripting) – This is a cyber attack on web applications where an attacker inserts malicious scripts directly into a web page. In this way, they can gain access to visitors’ cookies or manipulate the content of the page.
- Botnets – infected computers that are controlled by an attacker and can be misused for malicious or illegal activities without the owners’ knowledge.

Cyber attacks in Slovakia
The number of cyber-attacks in Slovakia is steadily increasing. In 2024, it even reached alarming values. According to statistics, the average number of attacks in the first six months was 801 attacks per week. In June, however, this number almost tripled to 1 380 attacks per week. The manufacturing sector sees the most attacks, with botnets among the most widespread. These attack devices regardless of whether they are running Windows, Linux or macOS. How do viruses get into devices? According to Check Point Research, email attachments are the main source, accounting for up to 78% of attacks. Most of these have an .exe extension, but files with .docx or .xls extensions are also dangerous, accounting for 36% of all malicious attachments. Emails are becoming increasingly sophisticated, and often fool even experienced professionals such as IT Tester Consultant Medior or programmers, who are well versed in these cyberattacks. Therefore, it is important to be careful when working with files and check the sender’s email address several times.
Cyber and security: best practices when working remotely
Remember that protecting your personal or work data is not a one-time activity. It is a never-ending process that consists of multiple steps and rules. We’ve written down the most important ones for you.
A quality antivirus is essential
Anti-virus is now a standard feature on almost every computer. It protects it from threats that lurk not only when surfing the Internet, but also when downloading files. It checks your device regularly without you having to turn anything on. So you can be sure you’re always safe. But not all antivirus is good. There are many different products on the market today, some of which are even free. However, these programs usually only provide a few additional features, such as ad blocking or VPNs, and don’t guarantee you comprehensive protection. When choosing security software and antivirus software, bet on proven companies that offer quality products and professional customer support. You’ll be able to contact them at any time if you have questions.
If you connect to public Wi-Fi, use a VPN
Public Wi-Fi networks are nowhere near as secure as your home or work network. If you don’t want a stranger getting access to your personal files, use a VPN. A VPN encrypts all your data and prevents anyone from intercepting and reading it. It also hides your IP address, making it virtually impossible to track your online activity. Also, when choosing a VPN, choose verified providers that have a large number of servers in different countries. This will guarantee you a smooth, reliable and fast connection. Don’t forget about the additional features. The VPN should support protocols such as IKEv2 or WireGuard and include a ‘Kill Switch’ that will automatically disconnect the device from the internet should the VPN fail.
Be careful what you click on
This rule applies not only to attachments in emails, but also when browsing pages on the internet or downloading apps to your computer or mobile phone. Always think carefully about your actions. If a site looks suspicious to you, leave it and find another source of information. For apps, it’s best to download them from verified developers and directly from official sites or platforms such as Google Play or the App Store.
Back up your data to a safe place
Back up data that you don’t use regularly and that doesn’t need to be stored on your computer to a well-secured work cloud. Only authorized people, such as your colleagues and supervisors, should have access to this cloud. Backing up your data is also important because your computer, mobile or tablet can fail at any time. Instead of losing everything, you simply use another device and download the documents and files you need from external storage in minutes.
Update the device software regularly
Updates can be annoying, but they’re crucial to your security. They improve minor imperfections in your operating system, programs or applications, reducing the risk of data being compromised. When you get a notification about the latest version, don’t delay – download it and install it. The good news is that you can turn on automatic updates on most devices with different operating systems. This means you won’t have to update apps manually, saving you a lot of time.
Use strong passwords and change them several times a year
Use a strong password on each account that includes letters, numbers and special characters. If you don’t feel like creating them manually, use password generators. Don’t write your passwords down anywhere, but store them in a password manager. This is often available directly from your browser or operating system. Another option is paid password managers, which provide a high level of security and offer various additional features. These include autofill for e-commerce purchases, clear mobile apps to store new passwords or browser extensions.
Use two-factor authentication
A strong password is important, but it is no longer enough today. That’s why you should enable two-factor authentication via SMS, email, phone call or an authentication app. The advantage is that even if someone gets your password, they can’t get into your account without the necessary code.
Find out how employers view cyber security
If you’re looking at job offers and looking for a new job, don’t just focus on employee benefits and monthly salary. Find out how the employer approaches cybersecurity, too. You probably won’t find this information in the job offer, so don’t be afraid to ask about it at the job interview.
Conclusion
Securing company data and devices while working remotely or while on holiday is essential to protect against growing cyber threats. Adhering to basic principles such as using VPNs, strong passwords and regular updates increases the level of cyber security. Employees and businesses alike should be vigilant and constantly adapt to new forms of attacks to reduce the risk of sensitive data being compromised.