Remote Working & Cyber Security

COVID-19 has transformed how companies operate today. With 50 percent to 90 percent of staff working remotely, organisations are now looking at remote work as the new working style in the future. While working remotely has its benefits, one of the biggest challenges it presents is cyber security problems. 

Remote working has a lot of benefits, including increased productivity, improved employee mental health, and reduced costs in office space. But it also has its challenges. Your remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences. 

For many businesses, remote working has become a normal practice. Working away from the office had been on the rise for the past few years, but many organisations were pushed to begin embracing it from March 2020.Since then, businesses have solved teething issues like remote collaboration and a lack of equipment. But what about the security implications?

Remote working brings with it a new set of cyber security challenges. We already know that your employees are your weakest link when it comes to your IT security and 95% of security problems start with human error. Cyber security education is vital to ensure that your remote working policies are followed closely .Remote working can blur the lines between business and personal life. That means employees could slip into bad cyber security habits, for example, using work devices for personal tasks and vice versa.

A survey by IBM found that over half of remote workers use a personal device to carry out their work. Business data is more likely to be compromised on a personal device, especially if people external to the business are using it. Employees won’t have business-grade security solutions installed on their personal devices and, with no IT supervision, they may have unknowingly installed malware or bloatware.

This isn’t a risk only associated with home working, but it’s amplified in this setting. Phishing emails in the UK significantly increased by over 600% during the start of the Covid virus. The attacks used widespread awareness of the subject to trick users into handing over their log-ins and financial information, and/or unwittingly downloading malware to their computers.

Phishing emails have become so sophisticated that it is increasingly becoming harder for employees to detect them, especially when phishing emails make it past email filters straight to an employee's main inbox.

Cyber criminals are also taking advantage of the pandemic itself. The study found that a lot of phishing emails were Covid-themed, capitalising on widespread fears about the virus. Some scam emails are impersonating the World Health Organisation (WHO) and it has now issued fake email guidance. Education is vital to avoiding falling victim to an email-borne cyber-attack. By empowering your employees to spot the signs of a suspicious email, file, or link, you’re strengthening your first line of defence. You can educate your staff in many ways, from mandatory training courses to tools which simulate phishing attacks. 

UK workers are also reckless when it comes to software. A fifth (20 percent) don’t install updates for collaboration and video conferencing tools, such as Zoom or Webex, and a quarter (23 percent) admit they do not update software installed on devices connected to their home WiFi network. Two thirds of workers haven’t received any formal training on how to stay safe when working from home, while only a third of businesses have established cybersecurity policies for remote working.
A strong cyber security defence includes strong password policies, however, this can often be overlooked or even put aside for most employees as something ‘to do later’. Sometimes their passwords might also not be strong enough to fight against cyber hackers.

Cybersecurity is a critical component in remote working. Employees need to ensure that they are following the guidelines to work from a remote location safely. Since remote working is going to become the new normal, cybersecurity will take the frontier in configuration and setup for remote employees. Cyber security should always be a high priority for businesses, but it takes precedence for organisations with a high percentage of remote workers. Only By putting effective training and the right security measures and in place, can you improve the chances that your remote workforce won't compromise the security of your business.

WHO:     Data Center Dynamics:       DZone:    Infosecurity Magazine:    ITProPortal:   SOS Can Help:     Image: Unplash

You Might Also Read:

Every Single Employee Requires Cyber Security Training:

 

« US Legislators Take Aim At Big Tech Companies
DarkSide May Not Stay Dark For Long »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.