Remote Working Has Real Cyber Security Risks

Companies experience a 78% increase in accidental data loss when employees work from home and organisations across the world are finding themselves newly vulnerable to cyber criminals looking to exploit mass uncertainty. This this could be just the push needed to transform they way they do cyber security and provide effective training.

Remote working has expanded the digital perimeter of many organisations, and that opens them up to these cyber risks. 

Organisations today are fending off cyber risks of all types, from malware to social engineering and malicious insiders. The onset of COVID-19, which has pushed many employees out of the office to work remotely, has also resulted in a boom in hostile digital equivalents.

The massive rise in home working and work outside of the traditional bounds of the office has expanded the digital perimeter of many organisations from a single location to hundreds, if not thousands. 

Even businesses that were previously set up to support remote working may struggle to handle it on such a scale and that's an environment in which cyber criminals will flourish. This problem highlights the importance of humans in the digital landscape. Both employees and managers need to understand the risks, their organisation's policies and procedures for managing them, and how to remediate issues if/when they occur.

Digital assets are now spread across many soft targets, rather than a handful of centralised harder ones and that means the business risk is greater.  Frustrated and isolated from colleagues remote workers into easier targets for cyber attacks

In order to facilitate secure remote work, many businesses need to ramp up their security efforts at the device level. This means using the latest technology to help monitor devices, and preparing end-users for unexpected changes to their work environment. 

Computing:         Raconteur:         Infosecurity Magazine:     DTEX

Relevant remote cyber security training should be introduced for all employees  and at Cyber Security Intelligence we recommend GoCyber training

You Might Also Read:

Easing Out Of Lockdown: Why Should Cyber Security Remain High On The Agenda?:


 

« Identity Theft - A Very Personal Hacking Attack
Creating Post-Modern Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.