The Many Dangers Of WFH

As organisations prepare for what life looks like in a post-pandemic world, one of the many issues they’ll have to address is IT security for home workers. According to the Velocity Smart Tech 2021 Report 70% of remote workers said they had experienced IT problems during the pandemic, and 54% had to wait up to three hours for the issue to be resolved.

While employees in this new remote work situation will be trying to stay connected with colleagues using chat applications, shared documents and through conference calls instead of physical meetings, many are probably not vigilant enough of the risk of cyber attacks.

A remote workforce comes with myriad dangers, with employees relying on their home networks, and sometimes their own devices, to complete tasks. Employers can only hope their people have technical skills, because should they experience any technical issues, there’s not much their IT team can do to help.

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently released a draft of its “Zero Trust Maturity Model” as US agencies are asked to reach a basic zero trust maturity level by the end of fiscal 2024.

A report in the USA highlighted that during the pandemic, remote workers had caused a security breach in as many as 20 per cent of businesses and while companies may feel they have all the necessary protections in place in their offices, with a new hybrid way of working which involves staff working partially or completely from home, client security could easily be compromised. 

One British cyber security service provider, Hicomply, is warning that not taking the right precautions for home working could lead to serious business disasters. Hicomply has created a SaaS (software as a service) platform used across a range of industries to manage information security. “If not done right, working from home introduces significant additional risks to business systems and critical information, with potentially disastrous consequences,” according to David Warren, Chief Operating Office at Hicomply.

Its not only the actual cost to a business but also customer confidence and  reputational damage that can be just as difficult to repair.

Some of the potential problems are around employees accessing sensitive or confidential information over poorly secured WiFi or VPN connections or using personal devices which may not have up-to-date software or anti virus protection. 

There is also the risk that visitors to the employee’s home may get sight of private information and possible security risks which could see devices being stolen. 

The Hicomply platform helps companies work towards ISO/IEC 27001 certification which can not only better place to them meet the criteria necessary to win lucrative contracts but can also help protect their valuable information.
“An ISO 27001 implementation can help manage risks associated with home working... Implementing technical measures such as secure log-on procedures, encryption and information back-up all help to protect information from unwanted access, theft and accidental loss.” said David Warren. 

This includes identifying business needs which in turn helps companies understand and justify the working at home risks, along with setting out the rules, roles and responsibilities for secure remote working. 

Working from home can bring significant benefits to an organisation and its employees but in order to reap those benefits, companies need to take the very real information security risks seriously. Hicomply recommend implementing an ISO 27001 Information Security Management System to help identify the main risks and priorities corrective action and give r employees a sense of responsibility for managing their organisation's security. 

Ensure your organisation provides cyber security awareness training, and keep IT resources well-staffed. Remote employees should have ready access to contact information for critical IT personnel to whom security incidents can be reported and who can assist with technical issues. 

Hicomply      ITGovernance:      I-HLS:      AdminControl:       MakeUK:       SHRM:

You Might Also Read: 

Cyber Security Resolutions (£):

 

« Russian Cyber Security Chief Charged
Ever Increasing Attacks On Maritime Ports & Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.