Two Thirds Of Organizations Suffer Breaches Due To WFH

The remote workplace is now popular across the world thanks to the rapid response to the covid pandemic. While many companies will have now been operating a remote or hybrid structure, a recent survey by security company Fortinet reveals that the remote workplace poses a significant security threat.

The 2022 annual report from the Internet Crime Complaint Center (IC3) shows that data breaches cost the US over $450m, a growth of 148% since 2020.

This demonstrates that, though employers are continuing to offer more flexible working options for their employees, they aren’t committing to keeping their networks secure.

Remote or hybrid workplaces offer unique challenges to data security and some companies may still be encountering new issues even two years into the process. However, the cost of insecure networks and lax document security is too high to not take every step possible to prevent breaches.

WFH Security Issues & The Procedure To Manage Them

Working from home of course means using your home WiFi network, which is undoubtedly more vulnerable than networks set up for business use. The security of an employee’s home network is also difficult and sometimes expensive to assess, meaning many companies will not be able to afford to do it or don’t have the infrastructure in place to do so.

There is technology available to assess personal WiFi systems but this is most likely unaffordable for most small businesses. Therefore, other steps need to be taken to ensure your staff know how to set up their own security. This could include guides on reviewing firewalls, the option to add antivirus software and providing IP addresses to your security team.

Additionally, some small businesses that began remote working in 2020 and have continued the policy may not have been able to offer devices to everyone working from home and are now experiencing issues with security because of this. Even with devices provided by the company, asset management poses a threat to security, particularly when employees leave the business or travel frequently.

Similar to the previous point, you may need to offer your staff security options to keep devices safe. It’s also important to ensure all staff have a strong awareness of their role in maintaining security in their work through regular training. Human error is always the most significant vulnerability and network issues only compound this challenge.

Not only do virtual documents pose challenges, but there are also security issues whenever employees need to use physical documents when working from home. As different kinds of data need to be disposed of in different ways to ensure security compliance, this is not always possible in a home office environment.

For any employees handling physical documents, training must be provided and regularly refreshed on how and when to properly dispose of data. You may also need to purchase equipment like a compliant shredder for your employees’ home offices. This will be necessary if your team works remotely often but may not always be affordable.

Ultimately, if these challenges are too expensive or difficult to manage, you may need to reassess your working-from-home policy. This could mean that some employees need to be in the office more than others or that remote working isn’t a possibility for your staff. Though many companies are working on a hybrid model, the level of insecurity this causes could be too much to risk for your company.

How The Remote Workplace Has Made Data Security Even More Essential

The Fortinet survey also found that most organizations haven’t mitigated the risks related to home working in the two years since the practice has become more commonplace. Since the data shows that the cost of data breaches has more than doubled in this same period, this highlights how essential security measures are.

Whether it’s virtual or physical data, every business needs to ensure they have thorough policies, the right technology and a competent awareness from all staff on how they can protect the boundaries of your organization from breaches.

Kyle Mitchell is Commercial Sales Director at Whitaker Brothers

You Might Also Read 

Retrofixing The Remote Workforce:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Manchester University Hacked
Meta Is Building A Rival To Twitter  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.