Which Industries Suffer Most From Remote Working?

The specialist security firm Specops Software has surveyed 2,043 business owners across 11 different sectors to discover which sector had the highest number of cybercrime threats or attempts since employers have had to work from home.
 
They discovered that 41% of employees have not been provided with adequate cyber security training whilst working from home. They also found that 54% of business owners have seen a rise in cyber-crime threats, with every sector reporting phishing as the most prevalent attack attempt since COVID-19. Despite this, 52% of businesses would consider a switch to permanent remote working for employees.
 
The US has fallen victim to a huge 156 separate ‘significant’ cyber-attacks in the period between May 2006 and June 2020. Significant attacks include assaults on a country’s government agencies, defence departments, or prominent high-tech companies, and which feature coordinated attacks which incur economic losses totalling more than a million dollars.
 
For the US, this equates to an unenviable average of 11 significant cyber-attacks targeting its government or high-value infrastructures every year.
 
Britain is the second most frequent target of “serious” cyber-attacks according according to the Specops Software report, with 47 such attacks from May 2006 to June 2020, one of which was the large scale cyberattack deployed across the Labour Party’s digital platforms during the 2019 general election.
 
Cybercrime threat rates by sector since lockdown vary significanty and some sectors hav experienced notable increases in cybercrime threat levels:      
 
  • Computer and IT                   -  78%
  • Medical and Health               -  73%
  • Accountancy, Banking           -  67%
  • Charity and Voluntary Work   -  62%
  • Customer Service                  -  55%
  • Marketing, Advertising, PR    -   53%
  • Legal Services                       -  47%
  • Recruitment and HR              -  44%
  • Creative Arts and Design       -  43%
  • Education and Training          -  36%
  • Travel and Hospitality             -  31%
Almost 4 in 5 (78%) business owners in the computer and IT sector have reported an increase in threats since lockdown, although, working from home still appears to be a viable option for many, as 85% of employers in this sector would consider permanent remote working.
 
It might be no surprise that  67% of those in the accountancy, banking and finance sector have seen a huge increase in threats, making them the third most likely sector to encounter cyber-attacks whilst working remotely.
 
The sector least likely to encounter cybercrime threats whilst working from home is the travel and hospitality sector, with only 31% noting an increase.
 
More than 7 in 10 (73%) businesses in the medical and health sector have reported an increase in cybercrime threats since lockdown began. The sector is still highly vulnerable and concerned about future attacks. Therefore, only 32% of businesses in this sector would consider remote working for employees. 
 
The biggest security concerns across the businesses surveyed during lockdown are: 
 
  • Ransomware – 96% 
  • Crypto jacking – 74%
  •  Phishing – 67%
  • IoT attacks – 48% 
  • Cyber attacks  against hardware – 39%  
Specops Software offers the following advise on how  about how businesses with significant reliance on remote workers can stay safe:
 
1. Make use of tools that can check your current passwords for ones that are on existing breached lists. Encourage users that are using breached passwords to change them.
 
2. Encourage the use of passphrases e.g. 3 random words, block the use of any breached passwords and if you are planning on increasing expiry times to avoid the “cached password” issue, look at using these longer expiry times as a way of rewarding the use of passphrases. Also consider reducing complexity as a balance for increasing the length to try an avoid users writing passwords down on post-it notes.
 
3. Another common attack vector post COVID-19 , are social engineering attacks on service desk staff. Users are no longer able to visit IT departments in person and maybe calling from public numbers rather than internal, so making sure that your service desk is actually speaking to “Susan from Accounts” and not a hacker is very important, the days of being able to “recognise the voice” isn’t a viable option any more.
 
4. Don’t forget to enable disk encryption on all devices that handle corporate data, this includes mobile devices, and use restrictions to block logins from disallowed countries or non-compliant devices.
 
5. Don’t forget the basics, make sure you have backups of all business-critical data. Make sure you test the backups and make sure you store those backups in a secure location and in an encrypted state. Review permissions to sensitive data both in the cloud and on prem, to make sure that the right people have the right access to the right data.
 
SpecOps Software:       Techround:         ITProportal:        Security Brief
 
You Might Also Read: 
 

Easing Out Of Lockdown: Why Should Cyber Security Remain High On The Agenda?:

 
« Six Reasons To Move Your SIEM To The Cloud
Australia's Cyber Security Plan Includes Domestic Surveillance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.