Half Of Lockdown Remote Workers Ignore Cyber Security

The Covid-19 virus has forced both employers and employees to change to remote working and this mean there is an acute  lack of IT security teams being able to focus on employees and their cyber actions. More than 50% of personnel are losing cyber security focus during home working and  putting their organisation at risk from cyberattacks and data breaches. 

Workers are taking more risks online than they would at the office. Analysis by researchers at cyber security company Tessian reveals that 52% of employees believe they can get away with riskier behaviour when working from home, such as sharing confidential files via email instead of more trusted mechanisms.

According to Tessian's, The State of Data Loss Report, some of the top reasons employees aren't completely following the same safe data practices as usual include working from their own device, rather than a company issued one, as well as feeling as if they can take additional risks because they're not being watched by IT and security. 

People mostly aren't ignoring security practices on purpose, but have distractions while working from home, such as childcare, room-mates and not having a desk set-up like they would at the office, are having an impact on how people operate. Soememployees say they're being forced to cut security corners because they're under pressure to get work done quickly.

Half of those surveyed said they've had to find work-arounds for security policies in order to efficiently do the work they're required to do, suggesting that in some cases, security policies are too much of a barrier for employees working from home to adapt to. 

By adopting workarounds employees could be putting their organisation at risk from cyberattacks, especially as hackers increasingly turn their attention to remote workers. "People will cut corners on security best practices when working remotely and find workarounds if security policies disrupt their productivity in these new working conditions," said Tim Salder, CEO of Tessian.  

Many organisations have been forced to hastily adopt remote-working structures and policies and as more are opting to keep these flexible structures, maintaining visibility over data flow is now more difficult. 

The new office is a virtual one, which means past strategies have become obsolete. In fact, they became obsolete the day companies switched to remote-working. While the surge in remote working is bringing additional challenges for both employees and employers, there are a number of simple steps that can be taken to boost security without impeding productivity. 

TESSIAN:       ZDNet:      East Midlands Business Link:

Security awareness training confronts the risk of data loss by educating employees on best practice and company policies. Business needs cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management – it is excellent – please contact GoCyber for a free trial.

You Might Also Read: 

Effective Cyber Security Training Using The GoCyber App

 

 

 

« Australia Creates Regional Cyber Innovation Centres
US Police Display Powerful New Surveillance Tools »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

DB CyberTech

DB CyberTech

DB CyberTech provides predictive security solutions that alerts to potential data loss from databases before any loss actually occurs.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.