Remote Working & Cyber Security

COVID-19 has transformed how companies operate today. With 50 percent to 90 percent of staff working remotely, organisations are now looking at remote work as the new working style in the future. While working remotely has its benefits, one of the biggest challenges it presents is cyber security problems. 

Remote working has a lot of benefits, including increased productivity, improved employee mental health, and reduced costs in office space. But it also has its challenges. Your remote employees may be unknowingly putting your company's data at risk. Working from home can potentially lead to data breaches, identity fraud, and a host of other negative consequences. 

For many businesses, remote working has become a normal practice. Working away from the office had been on the rise for the past few years, but many organisations were pushed to begin embracing it from March 2020.Since then, businesses have solved teething issues like remote collaboration and a lack of equipment. But what about the security implications?

Remote working brings with it a new set of cyber security challenges. We already know that your employees are your weakest link when it comes to your IT security and 95% of security problems start with human error. Cyber security education is vital to ensure that your remote working policies are followed closely .Remote working can blur the lines between business and personal life. That means employees could slip into bad cyber security habits, for example, using work devices for personal tasks and vice versa.

A survey by IBM found that over half of remote workers use a personal device to carry out their work. Business data is more likely to be compromised on a personal device, especially if people external to the business are using it. Employees won’t have business-grade security solutions installed on their personal devices and, with no IT supervision, they may have unknowingly installed malware or bloatware.

This isn’t a risk only associated with home working, but it’s amplified in this setting. Phishing emails in the UK significantly increased by over 600% during the start of the Covid virus. The attacks used widespread awareness of the subject to trick users into handing over their log-ins and financial information, and/or unwittingly downloading malware to their computers.

Phishing emails have become so sophisticated that it is increasingly becoming harder for employees to detect them, especially when phishing emails make it past email filters straight to an employee's main inbox.

Cyber criminals are also taking advantage of the pandemic itself. The study found that a lot of phishing emails were Covid-themed, capitalising on widespread fears about the virus. Some scam emails are impersonating the World Health Organisation (WHO) and it has now issued fake email guidance. Education is vital to avoiding falling victim to an email-borne cyber-attack. By empowering your employees to spot the signs of a suspicious email, file, or link, you’re strengthening your first line of defence. You can educate your staff in many ways, from mandatory training courses to tools which simulate phishing attacks. 

UK workers are also reckless when it comes to software. A fifth (20 percent) don’t install updates for collaboration and video conferencing tools, such as Zoom or Webex, and a quarter (23 percent) admit they do not update software installed on devices connected to their home WiFi network. Two thirds of workers haven’t received any formal training on how to stay safe when working from home, while only a third of businesses have established cybersecurity policies for remote working.
A strong cyber security defence includes strong password policies, however, this can often be overlooked or even put aside for most employees as something ‘to do later’. Sometimes their passwords might also not be strong enough to fight against cyber hackers.

Cybersecurity is a critical component in remote working. Employees need to ensure that they are following the guidelines to work from a remote location safely. Since remote working is going to become the new normal, cybersecurity will take the frontier in configuration and setup for remote employees. Cyber security should always be a high priority for businesses, but it takes precedence for organisations with a high percentage of remote workers. Only By putting effective training and the right security measures and in place, can you improve the chances that your remote workforce won't compromise the security of your business.

WHO:     Data Center Dynamics:       DZone:    Infosecurity Magazine:    ITProPortal:   SOS Can Help:     Image: Unplash

You Might Also Read:

Every Single Employee Requires Cyber Security Training:

 

« US Legislators Take Aim At Big Tech Companies
DarkSide May Not Stay Dark For Long »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

Conference-Service.com

Conference-Service.com

Conference-Service.com provides a categorised calendar of conferences and events which includes Information Security.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.