Remote Working & Cyber Security

COVID-19 has transformed how companies operate today. With 50 percent to 90 percent of staff working remotely, organisations are now looking at remote work as the new working style in the future. While working remotely has its benefits, one of the biggest challenges it presents is cyber security problems. 

Remote working has a lot of benefits, including increased productivity, improved employee mental health, and reduced costs in office space. But it also has its challenges. Your remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences. 

For many businesses, remote working has become a normal practice. Working away from the office had been on the rise for the past few years, but many organisations were pushed to begin embracing it from March 2020.Since then, businesses have solved teething issues like remote collaboration and a lack of equipment. But what about the security implications?

Remote working brings with it a new set of cyber security challenges. We already know that your employees are your weakest link when it comes to your IT security and 95% of security problems start with human error. Cyber security education is vital to ensure that your remote working policies are followed closely .Remote working can blur the lines between business and personal life. That means employees could slip into bad cyber security habits, for example, using work devices for personal tasks and vice versa.

A survey by IBM found that over half of remote workers use a personal device to carry out their work. Business data is more likely to be compromised on a personal device, especially if people external to the business are using it. Employees won’t have business-grade security solutions installed on their personal devices and, with no IT supervision, they may have unknowingly installed malware or bloatware.

This isn’t a risk only associated with home working, but it’s amplified in this setting. Phishing emails in the UK significantly increased by over 600% during the start of the Covid virus. The attacks used widespread awareness of the subject to trick users into handing over their log-ins and financial information, and/or unwittingly downloading malware to their computers.

Phishing emails have become so sophisticated that it is increasingly becoming harder for employees to detect them, especially when phishing emails make it past email filters straight to an employee's main inbox.

Cyber criminals are also taking advantage of the pandemic itself. The study found that a lot of phishing emails were Covid-themed, capitalising on widespread fears about the virus. Some scam emails are impersonating the World Health Organisation (WHO) and it has now issued fake email guidance. Education is vital to avoiding falling victim to an email-borne cyber-attack. By empowering your employees to spot the signs of a suspicious email, file, or link, you’re strengthening your first line of defence. You can educate your staff in many ways, from mandatory training courses to tools which simulate phishing attacks. 

UK workers are also reckless when it comes to software. A fifth (20 percent) don’t install updates for collaboration and video conferencing tools, such as Zoom or Webex, and a quarter (23 percent) admit they do not update software installed on devices connected to their home WiFi network. Two thirds of workers haven’t received any formal training on how to stay safe when working from home, while only a third of businesses have established cybersecurity policies for remote working.
A strong cyber security defence includes strong password policies, however, this can often be overlooked or even put aside for most employees as something ‘to do later’. Sometimes their passwords might also not be strong enough to fight against cyber hackers.

Cybersecurity is a critical component in remote working. Employees need to ensure that they are following the guidelines to work from a remote location safely. Since remote working is going to become the new normal, cybersecurity will take the frontier in configuration and setup for remote employees. Cyber security should always be a high priority for businesses, but it takes precedence for organisations with a high percentage of remote workers. Only By putting effective training and the right security measures and in place, can you improve the chances that your remote workforce won't compromise the security of your business.

WHO:     Data Center Dynamics:       DZone:    Infosecurity Magazine:    ITProPortal:   SOS Can Help:     Image: Unplash

You Might Also Read:

Every Single Employee Requires Cyber Security Training:

 

« US Legislators Take Aim At Big Tech Companies
DarkSide May Not Stay Dark For Long »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.