The Top 5 Challenges Of Securing Remote Work

This time last year, we might not have imagined we’d still need to accommodate so many remote workers in our security plans for 2023. Any assumptions that we’d have returned more or less to ‘normal’ have been shattered.

Not only have organisations recognised the benefits to be gained from remote working, but it has become a privilege that employees expect.

Increased remote working has expanded the attack surface, bringing with it endpoint sprawl. Employees are accessing networks, systems and data from diverse devices in multiple locations, and cyber-attackers will keep targeting them as access points, hoping to catch them with their guard down.

In parallel, we’re likely to see a near complete decentralisation of IT capability in 2023. The more people work away from the office, the less they’ll want to lean on IT to get tasks completed. Less contact with IT will erode the visibility and control teams once had over enterprise systems and their users. 

According to research carried out in the summer by Apricorn, more than 60% of UK IT decision makers expect their remote workers will expose the organisation to a data breach. Almost 30% believe this has already happened - with remote workers having knowingly put corporate data at risk in the last year. The respondents cited phishing and user error as the main causes of breaches in their organisation.

The same survey questioned IT leaders on their biggest challenges when implementing a cybersecurity plan for mobile and remote working. The following five came out on top. 

1.    The complexity of managing the technology that employees need and use – cited by 42% of respondents.

2.    A lack of awareness among employees of the risks to data when working out of the office (38%). 

3.    Lack of confidence in security measures – with one third (32%) admitting that they cannot be certain their data has been adequately secured.

4.    Employees who are aware of the risks of remote working will still lose data and expose the organisation to a breach (31%). 

5.    Complying with legislation – with 29% saying that mobile or remote working makes it harder to comply with GDPR. 

There are three straightforward steps organisations can take to help address these obstacles in their cybersecurity plans for the coming year, all focusing on the endpoint - that potential entry ‘door’ attackers exploit to gain access to data and systems.

Mitigating The Human Risk

Whether intentional or not, employees’ actions – or inactions – are frequently to blame. Ongoing education has a critical part to play in plugging the awareness gap, by engaging remote working employees in remaining vigilant and following security policy at all times. 

As well as cybersecurity best practice, they should understand the specific threats and risks to the organisation, and the consequences of mishandling data and devices when out of the office. This will help to make sure people genuinely want to ‘do the right thing’. A set of ever-evolving policies that clearly lay out what ‘the right thing’ is, detailing security procedures and how to follow them, is essential.

Wherever possible, policy should be enforced and automated in technology, to remove the decision from the end user; for example locking USB ports to only accept approved storage devices. 

Encrypt All Data & Back It Up Offline

Mandating the encryption of data as standard, on the move and at rest, will address the issue of technical complexity, as well as assuage any doubts about how secure information is. The approach is also specifically recommended in Article 32 of GDPR as a way of safeguarding personal data.

Encrypting data ensures it remains fully protected: even if a remote worker leaves a device containing in a café or an Uber, the data will be unreadable to anyone without the decryption key.

Additionally, employees should be required to make offline local backups of the data they create and handle. This will protect information, and provide the best chance of restoring it in the event of a ransomware attack or technical failure, for instance.

Storing data on an encrypted removable hard drive or USB is a practical way of doing this. These devices can be disconnected from the network to create an ‘air gap’ between information and threat. They also give remote workers a way to move information around safely offline.

When employees are working away from the office, they need unhindered access to systems, applications and confidential data. Embracing this means accepting that they’ll expose the organisation to risk. The answer to overcoming the security challenges of a remote working environment is not to scrutinise or limit what employees do; this will only stifle productivity and frustrate people. Instead, organisations should take a strategic and proactive approach that devolves some responsibility for ensuring the integrity of information onto individuals, while applying encryption to build a last line of defence.

Jon Fielding is Managing Director EMEA of Apricorn

You Might Also Read: 

No Slack In The System:

 

« Trump Turns Down Twitter
Cybersecurity Risk Management In The Real World »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.

GlitchSecure

GlitchSecure

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.