NGI Talk: Cybersecurity for teleworking

NGI Talk: Cybersecurity for teleworking

Every day we must make decisions about hundreds of different risks. Whether it is crossing the street, washing your hands or downloading new software, there is always some risk assessment, frequently based on our previous experience in similar situations or general recommendations and best practices.

When situation changes, so does the risk assessment. Working from home is not the same as working from your office, so risks is also different undoubtedly higher.

One, vulnerability increases. Home computers are more likely to be out of date, unpatched, and unprotected. Discovery and exploitation of vulnerabilities is easier for attacker.

Two, attack surface increases. Road that data needs to take from A to B is longer, with many curves and blind spots. Use of new and unfamiliar “shadow IT” services also open new attack vectors.

Three, the general chaos of "doing things differently", distraction and so many other “human factors” that make teleworking a different context for risk assessment.

On 25th of June, during an event called Funding Continuity Day, I gave an NGI talk on “Cybersecurity for teleworking”. Get to know more by watching the webinar here:

https://spaces.fundingbox.com/spaces/ngi-next-generation-internet-ngi-news-events/5f05a54c4fb658397263c63d

NGI stands for next generation internet and you can find more about it here:

https://twitter.com/NGI4eu

https://www.dhirubhai.net/company/ngi4eu/


要查看或添加评论,请登录

Aljosa Pasic的更多文章

  • Security Classification of IoT Devices

    Security Classification of IoT Devices

    When classifying IoT devices and IoT hardware from a security perspective, there are different taxonomies or frameworks…

  • Mutual authentication of Cinderella and a shoe

    Mutual authentication of Cinderella and a shoe

    Once upon a time, in a faraway kingdom, not subject to EC eIDAS regulations, there lived a young girl named Cinderella.…

    3 条评论
  • Cybersecurity Fairy Tale

    Cybersecurity Fairy Tale

    Cybersecurity awareness and education should start with the primary school!!! Some 10 years ago this was the typical…

    2 条评论
  • AI based anomaly detection for decentralised Electrical Power and Energy Systems

    AI based anomaly detection for decentralised Electrical Power and Energy Systems

    On Novemeber 10th 2022, SDN-microSENSE project held Virtual Open Event where the latest results and outcomes of…

  • Lessons from Descartes, part 3: hardware and software dualism

    Lessons from Descartes, part 3: hardware and software dualism

    (You might want to read part 1 and part 2 before this article, although these are not related directly). Unfortunately,…

    1 条评论
  • Lessons from Descartes, part 2: technology and market dichotomy

    Lessons from Descartes, part 2: technology and market dichotomy

    The coordinate system, as we know it today, is called the Cartesian system, after the French mathematician René…

  • Future of Cybersecurity Education in Europe

    Future of Cybersecurity Education in Europe

    Recently I was listening to recording of Sir Ken Robinson, a professor, advisor, author, and speaker on education…

    1 条评论
  • Smart Cybersecurity?

    Smart Cybersecurity?

    The prefix “cyber” has been used in many terms like cybercrime, cyberterrorism and cyberwarfare, although often with…

    1 条评论
  • Efficient R&D in collaborative projects

    Efficient R&D in collaborative projects

    When it comes to efficient technology transfer from R&D to company portfolio, change is the only constant. In Atos…

  • ENSURESEC project

    ENSURESEC project

    We do not hear much about specific e-commerce threats, apart from common site and transaction security, and maybe…

社区洞察

其他会员也浏览了