Bad habits of an overly dispersed workforce

0


The vaccine rollout still has reasons to cover, and it’s still unclear when we can return to the office for good. A lot of people will have really flexible working practices when we do. It’s no secret that cybercriminals are taking advantage of remote or hybrid working trends to view these employees as vulnerable targets.

About the Author

John Vladimir Slamecka is president of AT&T EMEA and Latin America.

Their assistive devices are now outside traditional on-site boundaries and are access points. According to the latest cybersecurity research, 55% of workers have been targeted by cybersecurity threats while working remotely in the past year. It’s perfectly reasonable to suggest that this number will increase as cybercriminals adopt more advanced tactics that make it increasingly difficult to stay ahead of the game.

Who’s wrong ?

Studies show that two-thirds of remote workers say they are more aware of cybersecurity threats since switching to telecommuting. It may be due to ignorance or war, but in any case their customs and rituals endanger them and their employers. The line between our work and our personal lives has blurred over the past year and will continue to converge as remote working becomes a permanent feature in the lives of many people. This is characterized by an ever-increasing hybrid use of devices and the internet, as well as a culture of extended duration and always-on connectivity.

The survey also shows that more than half of workers regularly use work devices for personal purposes, such as online banking, social media and even online gambling. Third, connect your work device to smart home devices like smart speakers and doorbells, which are often poorly protected. Notably, the casino was hacked in 2017 via an internet-connected fish thermometer. Recently, there have been numerous reports of cybercriminals accessing their home Wi-Fi networks and other connected devices.

Remote workers may never think about the risk of checking social media during lunch breaks on their work devices. However, third-party consumer apps always come with risks. Take a look at recent information leaks from over 500 million users in 106 countries. Breaches of this magnitude can have a widespread impact, and the theft of your preferred password can compromise other accounts.

But the responsibility does not rest only on the shoulders of teleworkers. Two in three find it difficult to practice good cybersecurity in the workplace, due to inadequate training or technical support (22%) and lack of priority from senior management (18). %) Empire. Companies that initially didn’t pay much attention to cybersecurity to accelerate the transition to telecommuting not only took risks, but also made employees vulnerable. This issue must be resolved quickly to ensure business continuity and better protect employees against future cyber attacks.

What can I do?

Traditional on-premise limits are now obsolete. Our dynamic work environment requires a risk-based approach to ever-evolving cybersecurity. Basic practices are no longer enough and the pressure on IT teams to track so many devices outside of the corporate environment is a major challenge. To stay ahead of cybercriminals, companies need to invest in training their employees on a regular basis and implementing technologies that can mitigate what is known as “human error”.

Just as businesses have measures in place to support their physical and mental health, they need to educate and support their employees to better understand cybersecurity when working outside the office. There is. This should include mandatory steps such as employee access to a secure internet connection and web applications. Companies should also provide enhanced cybersecurity training to help employees mitigate the risk of attacks and protect everyone involved. That said, a holistic approach to cybersecurity needs to be more than just training.

The rapidly changing world of work is a major issue for security managers. The workforce in the months and years to come will be over-diversified. A transition to cloud-based network security models such as SASE, an architecture that combines wide area network (WAN) technology with comprehensive security capabilities, is underway. Existing infrastructure is struggling to support this new workplace dynamic in the most efficient way.

It should be an interconnected ecosystem where data flows between different points in a secure manner. This means protecting applications, networks, smartphones, servers behind corporate firewalls, data centers, data sent to and from the cloud, etc. With this complex infrastructure and employees regularly connecting laptops to insecure networks and devices, it’s clear that businesses need to take a zero-trust approach to cybersecurity. became. Zero Trust assumes that traditional access credentials are no longer sufficient to accurately establish trusted identities for user, device, and application access. Instead, organizations should perform continuous risk-based assessments and deploy precise security controls to manage, monitor, and improve access.

Otherwise, cybercriminals wouldn’t bother to strike. They don’t have to.


Share.

About Author

Leave A Reply