UK Business Faces Particular Lockdown Security Threats

The Cyber security experts at CrowdStrike, has issued a stark warning to British businesses, telling them to crack down on lax remote working policies now or risk catastrophic exposure at the hands of adversaries after lockdown is over. 

Its research, carried out in in cooperation with YouGov, has found that over half (52%) of people in the UK working from home do so on their own personal devices, creating potential backdoors into corporate systems for adversaries. CrowdStrike has also seen a 100X increase in COVID-19 related malicious files circulating in February and March, yet two thirds (65%) of remote workers in the UK say they had no extra training against cyberattacks.

Mike Sentonas, CTO at CrowdStrike, said: “Most companies had to improvise in order to keep their operations running during lockdown. But the rush of creating a fully remote workforce has meant that proper cyber security practices have fallen by the wayside. We have seen a rapid increase in attempted cyber-attacks by criminals taking advantage of the situation.”

Despite the rapid evolution and expansion of the cyber security threat landscape during the pandemic, only a third (33%) of respondents believe that cyber-attacks are more likely now than before the lockdown. Similarly, only 6% of respondents believe their personal devices are less secure than corporate ones, highlighting the urgent need for education around cyber security threats.

"It is important to stress that businesses in the UK are at huge risk of cyber security breaches right now....Most companies had to improvise in order to keep their operations running during lockdown. But the rush of creating a fully-remote workforce has meant that proper cyber security practices have fallen by the wayside." Semtaonas said.

"If companies don't take urgent action to tighten security measures around remote working practices, adversaries will gut organisations from the inside out. The time for UK businesses to wake up from their COVID-19 induced cyber security slumber is now," concludes Sentonas.

Crowdstrike:       Intelligent CIO:        Security Informed:      NextGov

You Might Also Read: 

Remote Working Is Transforming The Security Landscape:

 

 


 

 

« Healthcare, Finance, Industry & Human Behaviour Will Be Transformed
COVID-19 Tracing App Problems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

ServiceNow

ServiceNow

ServiceNow is the enterprise IT cloud company. We transform IT by automating and managing IT service relationships across the global enterprise.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Information Network Security Agency (INSA)

Information Network Security Agency (INSA)

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

HyperQube

HyperQube

HyperQube is a “cyber range as a service” offering that enables enterprises to quickly and easily build an exact copy of any IT infrastructure.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Cloudpurge

Cloudpurge

Cloudpurge was created to build a platform to protect users against the growing threat of malicious web-based payloads including Malware, Ransomware and Phishing attacks.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.