Lockdown: Half Of Organisations Are Having Cyber Security Problems

Half of all organisations experienced security incidents associated with remote working during the lockdown period, according to a Report by data security experts at Tessian.  In the survey of 1000 workers in the UK and 1000 workers in the US, a quarter admitted to clicking on a link in a phishing email whilst at work. 

When the world went into lockdown, ways of working changed significantly and now business leaders must decide whether the future of work is remote, office-based, or a combination of the two.

Whatever the decision, companies are going to have to make significant changes to how they run their business,to take account of employees’ expectations for a level of flexibility that enables them to work however and wherever they want. This will have huge implications for corporate cyber security teams.

Tessian's report 'Securing the Future of Hybrid Working' finds  that phishing is the largest threat when employees work remotely. 

  • Nearly two-thirds of US and UK employees (65%) said they received a phishing email during the remote working period that was enforced by the global COVID-19 pandemic. 
  • While remote working was a predisposing factor for cyber-attacks, the Tessian found that most employees prefer hybrid working environments, with just 11% exclusively preferring office work.
  • Three quarters of IT decision-makers believed that hybrid or remote working was the future of the workplace where this type of  working environment allows employees to choose between working in the office or at remote locations of their choice.
  • 85% of IT leaders surveyed believe that hybrid and remote working plans led to an increase in the number of security incidents recorded between March and July 2020.

Employees were under increased stress and many were laid off or lost their jobs and Tessian found that   IT leaders think that being outside of their normal office environment might play a role in this.

  • 78% believe their company is at greater risk of insider threats when employees are working remotely. 
  • Tiredness (43%) and distraction (41%) are also significant factors when it comes to making mistakes.

With remote working set to continue for the foreseeable future, organisations will need to develop new health approaches. Many studies over the last few months have shown that employees feel they have to work longer hours when at home. Now remote working may become part of the future working model and security teams will need to adapt and implement robust and sustainable security controls.

TESSIAN:        Enterrprise Time:       Infosecurity Magazine:    CPO Magazine

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« New Skills For A Career In Cyber Security
AI Can Help Fight Coronavirus Cyber Crime »

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Windstream Enterprise

Windstream Enterprise

Windstream Enterprise offer a range of innovative network, communications and collaboration solutions optimized and secured for a cloud centric, anytime/anywhere world.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

Cyber adAPT

Cyber adAPT

Cyber adapt provide an integrated platform that secures the operation of Smartphones and BYOD.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Moran Cyber

Moran Cyber

Moran Cyber offers an innovative shipping-focused cyber security solutions platform.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Senseon

Senseon

Senseon’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.