Home Working Creates More Cyber Attacks

A remote workforce comes with  numerous risks, with employees relying on their home networks and sometimes their own devices, to complete tasks. In many cases they will lack the skills to deal with even simple technical issues and will be dependent up remote IT support.

According to Velocity-Smart Technology’s recent research 70% of remote workers said they had experienced IT problems during the pandemic, and 54% had to wait up to three hours for the issue to be resolved.

Remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences.

REvil, a cyber criminal hacking group, chose US Independence Day, 4 July for a number of cyber attacks knowing that many IT and cyber security teams would be on holiday. Over a 1,000 companies in the US, and at least 17 other countries were hacked.  Among those hacked was a well-known software provider, Kaseya.  REvil used Kaseya as a conduit to spread its ransomware through other corporate and cloud-based networks that use the software.

REvil subsequently claimed responsibility for the incident and claimed to have encrypted more than one million systems. The group then demanded a ransom of $70m (£50.5m) in Bitcoin for the release of a universal decryption tool that would allow those affected to recover their crucial files.

Hacking experts warn that such attacks are likely to become more frequent, and suggest businesses cannot afford to underestimate the hidden impact the pandemic has had on their vulnerability. A recent survey from the leading security firm, Tessian, found that 56% of senior IT technicians believe their employees have picked up bad cyber-security habits while working from home. Furthermore, the survey found that many employees agreed with that assessment. 

  • Nearly two in five (39%) admitted that their cyber-security practices at home were less thorough than those practiced in the office, with half admitting that this is a result of feeling less scrutinised by their IT departments now, than prior to Covid. 

Experts also warn of a significant growth in the number of coronavirus-themed phishing emails targeting employees, being reported by several companies around the world. Attacks are rising not only because of remote working but as criminals become more organised and ransomware attacks become easier to execute.

The only reason ransomware remains lucrative is because victims pay the ransom, opting to do so because they think it is as the best way to restore the network. But paying the ransom means attacks will just continue. Employers, management and employees need to act quickly to plug potential security threats to ensure their businesses continues to operate safely and avoids any hack that may affect themselves and their clients.

Velocity-Smart:       IT Governance:      Forbes:      SOSCanHelp:         Digiday:     

ZDNet:      Guardian:       BBC

You Might Also Read:

Will Governments Ban Ransom Payments To Hackers?:

 

« New Tools Optimise Use Of Existing Data
Nexperia - A Bigger Threat Than Huawei? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.

SafeShark

SafeShark

SafeShark are Product Security and Telecommunications Infrastructure (PTSI) Act and Radio Equipment Directive (RED) compliance specialists.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.