The Many Dangers Of WFH

As organisations prepare for what life looks like in a post-pandemic world, one of the many issues they’ll have to address is IT security for home workers. According to the Velocity Smart Tech 2021 Report 70% of remote workers said they had experienced IT problems during the pandemic, and 54% had to wait up to three hours for the issue to be resolved.

While employees in this new remote work situation will be trying to stay connected with colleagues using chat applications, shared documents and through conference calls instead of physical meetings, many are probably not vigilant enough of the risk of cyber attacks.

A remote workforce comes with myriad dangers, with employees relying on their home networks, and sometimes their own devices, to complete tasks. Employers can only hope their people have technical skills, because should they experience any technical issues, there’s not much their IT team can do to help.

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently released a draft of its “Zero Trust Maturity Model” as US agencies are asked to reach a basic zero trust maturity level by the end of fiscal 2024.

A report in the USA highlighted that during the pandemic, remote workers had caused a security breach in as many as 20 per cent of businesses and while companies may feel they have all the necessary protections in place in their offices, with a new hybrid way of working which involves staff working partially or completely from home, client security could easily be compromised. 

One British cyber security service provider, Hicomply, is warning that not taking the right precautions for home working could lead to serious business disasters. Hicomply has created a SaaS (software as a service) platform used across a range of industries to manage information security. “If not done right, working from home introduces significant additional risks to business systems and critical information, with potentially disastrous consequences,” according to David Warren, Chief Operating Office at Hicomply.

Its not only the actual cost to a business but also customer confidence and  reputational damage that can be just as difficult to repair.

Some of the potential problems are around employees accessing sensitive or confidential information over poorly secured WiFi or VPN connections or using personal devices which may not have up-to-date software or anti virus protection. 

There is also the risk that visitors to the employee’s home may get sight of private information and possible security risks which could see devices being stolen. 

The Hicomply platform helps companies work towards ISO/IEC 27001 certification which can not only better place to them meet the criteria necessary to win lucrative contracts but can also help protect their valuable information.
“An ISO 27001 implementation can help manage risks associated with home working... Implementing technical measures such as secure log-on procedures, encryption and information back-up all help to protect information from unwanted access, theft and accidental loss.” said David Warren. 

This includes identifying business needs which in turn helps companies understand and justify the working at home risks, along with setting out the rules, roles and responsibilities for secure remote working. 

Working from home can bring significant benefits to an organisation and its employees but in order to reap those benefits, companies need to take the very real information security risks seriously. Hicomply recommend implementing an ISO 27001 Information Security Management System to help identify the main risks and priorities corrective action and give r employees a sense of responsibility for managing their organisation's security. 

Ensure your organisation provides cyber security awareness training, and keep IT resources well-staffed. Remote employees should have ready access to contact information for critical IT personnel to whom security incidents can be reported and who can assist with technical issues. 

Hicomply      ITGovernance:      I-HLS:      AdminControl:       MakeUK:       SHRM:

You Might Also Read: 

Cyber Security Resolutions (£):

 

« Russian Cyber Security Chief Charged
Ever Increasing Attacks On Maritime Ports & Systems »

Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Pulsant

Pulsant

Pulsant provide Hybrid IT Solutions and Managed Cloud Hosting platforms, helping businesses address critical security, IT compliance and transformation requirements.

Veridu Labs

Veridu Labs

Veridu provides a set of online tools to verify the identity of users to eliminate fraud and unwanted behavior.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

CyNation

CyNation

CyNation is an Integrated Risk Management company focused on managing the risks inherent in supply chains and third-party ecosystems.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.