The Hidden Dangers of Remote Work – Insider Insights on Security Risks

The Hidden Dangers of Remote Work – Insider Insights on Security Risks

Common (and uncommon) remote work risks and how to beat hackers at their own game

It’s predicted that, by next year, more than 20% of working adults will be doing their jobs somewhere other than inside their employer’s office. They are and will work from home, a café, a beach, or anywhere else. That adds up to more than 22 million people free to work from where they want.

It also creates ample opportunities for cybercrime. Hackers gleefully rub their hands together over unsecured networks, with no physical oversight and plentiful social engineering opportunities, among other remote work risks. Danger lurks everywhere when contractors or employees work remotely, whether using work devices or their own.

Research has shown that workplace flexibility attracts the best talent, improves employee morale, and gives companies that offer a flexible work environment a 21% profitability boost . But from the roses come the thorns in the form of overt and hidden dangers associated with remote workers.?

This article explores the hidden dangers of remote work, offering insider insights from Attentus Technologies that will keep your remote workforce and your business safe.

Common (and uncommon) security risks of remote working

Businesses have reported that remote workers cause 20% of security breaches , subsequently increasing the average cost of a breach to $137,000. The causes of these security incidents are myriad, and the employee and the employer often share the blame.

Remote workers are top targets for social engineering and phishing emails.

Just this year, more than 90% of businesses experienced email-related security breaches , which generated almost 80% of ATO (account takeover) attacks.

  1. Remote work lacks a robust security infrastructure. Your business may have top-notch cybersecurity, but home networks are usually less secure, and there may be no security in cafes and other public areas. These networks are sitting ducks for cyberattacks such as unauthorized access, data breaches, and malware.
  2. Lack of system updates Application and system update pop-ups can be annoying, but by not installing essential updates, cybercriminals can easily access your corporate network.
  3. DDoS Attacks Distributed denial of service (DDoS) attacks are a less common way for hackers to cut off remote workers’ access, leaving them unable to do their jobs. These attacks are especially disruptive, not only to your operations but to your reputation.
  4. No physical oversight When employees aren’t in the office, there is no physical oversight. This means employees can engage in risky online behavior, and it’s much more difficult for I.T. teams to enforce security policies.
  5. Unsecured Wi-Fi networks Poorly protected home networks and unsecured public Wi-Fi are a nightmare waiting to happen. These networks are easily compromised, leading to data interception or attacks.
  6. Slow response times The slower the response, the more time bad actors have to wreak havoc. When workers are not in the office, finding and mitigating threats takes longer. This increases the severity of the attack. During the pandemic, a study showed that 54% of remote employees waited more than three hours for resolution, and it took organizations much longer to find and contain the incident.
  7. There’s a larger attack surface Remote workers increase the attack service—it includes not only your corporate network but also home networks and personal devices used by remote employees.
  8. BYOD policies Bring your own device (BYOD) is convenient for employers, but risk lies in a lack of security measures, which can be challenging for I.T. teams to manage remotely.
  9. Public network risks You likely realize the dangers of unsecured public networks, but another important consideration is “shoulder surfing.” Working in a café, for example, allows those with malicious intent to spy on your screen or overhear a conversation that will enable an invasion.
  10. Weak passwords Weak passwords abound, and they pose a significant risk. As difficult as it may be to believe, 123456 is still the most common password in 2024.
  11. Misconfigured cloud security When cloud services are misconfigured, they can expose sensitive data to prying eyes.
  12. Zoombombing Nowhere is safe in cyberspace. Cybercriminals can enter video streams, disrupt meetings, breaching privacy and data.
  13. Complacency Remote working can create complacency in workers. They may not follow best practices, and worst of all, research shows that 47% of employees say that distraction was why they fell for a fishing scam.
  14. File sharing Without adequate security, file sharing is extremely dangerous, resulting in data breaches.

?

It’s a long list, and it will likely increase as cybercriminals become more sophisticated with each new technology, even using AI to launch attacks.?

So, what can you do about security risks?


There are more than 2,200 cyberattacks every day—one every 39 seconds—and 95% of them target the government, technology companies, and retail. Phishing is by far the most common, with most targeting login credentials. In the first quarter of 2024 alone, bad actors created almost one million phishing sites monthly.

I.T. departments should initiate the following security controls:

  1. Implement multi-factor authentication.
  2. Mandate the use of a password manager.
  3. Enforce the use of VPNs.
  4. Create and distribute a remote working security policy with best practices and guidelines.
  5. Discourage the use of public Wi-Fi.
  6. Supply employees with devices and prohibit BYOD.
  7. Automate locking and unlocking.
  8. Devise a routine for software updates.
  9. Advise remote workers to screen share only what’s necessary.
  10. Prohibit the sharing of work-related information on social media.
  11. Use software controls to turn off webcams when not in use.
  12. Install anti-virus software.
  13. Partner with a managed I.T. services company with cybersecurity expertise.

?

Keeping company data in a secure, centralized, cloud-based environment is essential to simplifying data management. I.T. teams should also use tools and best practices to map and monitor remote connections for full visibility—this enables early threat detection and speedy response.?

Another best practice for remote—and indeed all—workers is cybersecurity training. For those working from home, provide easy access to policies and training materials and engage in formal training via videoconferencing. Training should be ongoing, with refreshers offered regularly and “emergency” meetings if a threat is detected. Nothing teaches as well as an example.?

Don’t take unnecessary risks

Protecting your business from cybersecurity threats requires a deep level of expertise. With over 20 years of experience in protecting businesses’ cybersecurity, Attentus Technologies is your trusted partner to reduce risk and boost your security posture.

We take the heavy lifting off the shoulders of your I.T. team, ensuring legal compliance, preventing system vulnerabilities, modernizing your network, and providing 24/7 system monitoring so that suspicious activity is immediately detected and addressed.

One of our core values is to seek constant improvement, which drives us to continuously refine and enhance our cybersecurity strategies, ensuring your business remains secure in an ever-evolving threat landscape.

Attentus Technologies customizes I.T. solutions for your entire organization and your employees to stay cyber secure while streamlining business operations. Have questions, or ready to beat hackers at their own game? Fill out this simple form to reach out and learn more.

You can read the original article at https://www.attentus.tech/it-services-blog/remote-work-risks

Steve Montgomery

Founder, Legion Private Wealth Management. Partnering with entrepreneurs to integrate businesses and assets, reduce taxes, and maintain control

2 个月

Good points. I also think community with people is pretty important.

回复

要查看或添加评论,请登录

社区洞察