Half Of Lockdown Remote Workers Ignore Cyber Security

The Covid-19 virus has forced both employers and employees to change to remote working and this mean there is an acute  lack of IT security teams being able to focus on employees and their cyber actions. More than 50% of personnel are losing cyber security focus during home working and  putting their organisation at risk from cyberattacks and data breaches. 

Workers are taking more risks online than they would at the office. Analysis by researchers at cyber security company Tessian reveals that 52% of employees believe they can get away with riskier behaviour when working from home, such as sharing confidential files via email instead of more trusted mechanisms.

According to Tessian's, The State of Data Loss Report, some of the top reasons employees aren't completely following the same safe data practices as usual include working from their own device, rather than a company issued one, as well as feeling as if they can take additional risks because they're not being watched by IT and security. 

People mostly aren't ignoring security practices on purpose, but have distractions while working from home, such as childcare, room-mates and not having a desk set-up like they would at the office, are having an impact on how people operate. Soememployees say they're being forced to cut security corners because they're under pressure to get work done quickly.

Half of those surveyed said they've had to find work-arounds for security policies in order to efficiently do the work they're required to do, suggesting that in some cases, security policies are too much of a barrier for employees working from home to adapt to. 

By adopting workarounds employees could be putting their organisation at risk from cyberattacks, especially as hackers increasingly turn their attention to remote workers. "People will cut corners on security best practices when working remotely and find workarounds if security policies disrupt their productivity in these new working conditions," said Tim Salder, CEO of Tessian.  

Many organisations have been forced to hastily adopt remote-working structures and policies and as more are opting to keep these flexible structures, maintaining visibility over data flow is now more difficult. 

The new office is a virtual one, which means past strategies have become obsolete. In fact, they became obsolete the day companies switched to remote-working. While the surge in remote working is bringing additional challenges for both employees and employers, there are a number of simple steps that can be taken to boost security without impeding productivity. 

TESSIAN:       ZDNet:      East Midlands Business Link:

Security awareness training confronts the risk of data loss by educating employees on best practice and company policies. Business needs cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management – it is excellent – please contact GoCyber for a free trial.

You Might Also Read: 

Effective Cyber Security Training Using The GoCyber App

 

 

 

« Australia Creates Regional Cyber Innovation Centres
US Police Display Powerful New Surveillance Tools »

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Anaval

Anaval

Aanval is a proven security and network operations tool with a strong focus on intrusion detection, coupled with robust log management and SIEM capabilities.

InfoSec Skills

InfoSec Skills

InfoSec Skills is a worldwide information security training and education company, comprising an expert team of highly respected security professionals

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Rosberg System

Rosberg System

Rosberg System provides security and management solutions for wireless mobile devices.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Retail Secure

Retail Secure

Retail Secure provide affordable cybersecurity and PCI compliance solutions for SMBs.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.