facebook linkedin twitter

Computerware Blog

Is Remote Work a Bigger Risk with Certain Employees?

Is Remote Work a Bigger Risk with Certain Employees?

Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.

As it happens, many business owners hold some preconceived notions as to which of their users constitute the biggest risks while working remotely. Let’s turn our attention to some statistics to see if these notions have any merit.

Cybersecurity in the Home Versus in the Office

Before we begin our review, it is important that we start off by acknowledging one thing: your employees probably aren’t used to subscribing to the same cybersecurity standards at home as they do in the office. While there will be exceptions, your team is generally going to be somewhat lax in their at-home security precautions.

This could easily cause remote work to become problematic. Consider it: when working remotely, your team isn’t operating within the protections installed on your business’ network. As a result, they could unwittingly allow in a threat and thereby give it access to whatever data or resources the individual responsible is privy to. Not only does this reinforce the importance of general access permissions, but it also makes it crucial that you encourage your employees to maintain high standards of security whenever and wherever attending to business matters.

According to a survey taken by the National Cyber Security Alliance, personal security standards are a mixed bag in more ways than one. Compiling the responses of 1000 American adults, with the sample split evenly between those aged 18 to 34 and those from 50 to 75 years of age, this survey helped to identify a few differences in behavior between these two cohorts.

The Survey’s Findings

Many of the insights that this survey presented were somewhat predictable. For instance, the younger cohort were more likely to put multi-factor authentication in place, 89 percent of respondents doing so compared to the elder cohort’s 70 percent. Similar numbers came up when it came to whether a user regularly applied software updates—83 percent of the younger group did, while 63 percent of the older group would.

Having said that, many of the data points generated through this survey told a much more two-sided story… one in which security practices were inconsistent across the board. While the younger cohort would more often use MFA, they would also neglect to update their basic security solutions, would connect to public Wi-Fi far more often, and didn’t reinforce their security when working remotely.

So, in this way, every age group can be a risk to cybersecurity while they work remotely… it just comes out in different ways.

How Does This Impact Your Business’ Security?

Here’s the hard truth: assuming that one group of users is inherently more or less secure than the other is a recipe for disaster, whether your team is working remotely or coming into the workplace each day. This means that your business’ security lies in your team’s awareness as a cohesive unit, which in turn means you need to do everything you can to keep them vigilant.

To do so, you need to clearly establish rules and procedures for everyone to follow as they’re working, wherever they happen to be at the time. Giving them different materials and exercises to use and evaluating their preparedness can help keep them accountable, as well as reveal to you where your potential vulnerabilities lie and what you need to do to resolve them.

If you need assistance with securing your team’s cybersecurity, reach out to our team here at Computerware. With our help, your team can be secure whether they’re working in the office or at home. Call (703) 821-8200 to find out more today.

Do a Better Job of Managing Your Support Costs
You’ll Need to Do Better Than Just a Firewall
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity IT Services Saving Money Efficiency Malware Innovation Google Small Business User Tips Collaboration Computer IT Support VoIP Quick Tips Data Backup Smartphones Network IT Support Data Recovery communications Mobile Devices Business Continuity Android Microsoft Office Gadgets Disaster Recovery Phishing Cybersecurity Smartphone Communication Social Media Upgrade Mobile Office Server Virtualization Mobile Device Miscellaneous Passwords Mobile Device Management Windows Managed IT Services Users Ransomware Holiday Operating System BDR Vendor Management Internet of Things Tech Term Apps Windows 10 Outsourced IT Unified Threat Management Remote Monitoring Facebook Automation BYOD Data Management Remote Computing Covid-19 Apple Mobile Computing Managed IT services Analytics WiFi Windows 10 Artificial Intelligence Training Marketing Managed Service Spam The Internet of Things Cloud Computing Browser Help Desk Save Money History Firewall Business Technology Bandwidth App Big data Encryption Health Alert Office 365 Budget Two-factor Authentication Information Technology IT Consultant Office Access Control Managed IT Windows 7 Content Filtering Gmail Blockchain Going Green Maintenance Printer Government Networking Hard Drives Cybercrime Information Bring Your Own Device Wi-Fi Antivirus VPN Remote Work Outlook Windows 8 Lithium-ion Battery Best Practice Document Management Hiring/Firing Virus Tech Support Recovery Employer-Employee Relationship Retail Computers Wireless Technology Saving Time Healthcare Search Cost Management Update Avoiding Downtime Risk Management iPhone It Management Conferencing Data Security Customer Service Patch Management Humor Data Loss IBM Money Storage Augmented Reality Vendor Project Management Phone System Computing Hacking Travel Education Law Enforcement Applications File Sharing Solid State Drive Compliance Hard Drive Data storage Voice over Internet Protocol Flexibility Save Time Mobility Wireless Router Downtime Laptop Remote Website Customer Relationship Management Legal PowerPoint Proactive IT Data Breach Computer Repair Running Cable Meetings Regulations Password Administration Value Current Events SaaS Intranet Twitter Hacker End of Support Software as a Service Robot Employees Securty User Fax Server Net Neutrality Chrome Business Intelligence Virtual Desktop Google Maps Black Market Digital Payment Social Excel Cryptocurrency Monitoring DDoS Social Engineering Scam Business Growth Comparison Tablet Employee/Employer Relationship Company Culture Management Private Cloud Social Networking Cooperation Word Paperless Office Vulnerabilities Digital Websites Cortana Sports Telephony Machine Learning Disaster Hosted Solution Telephone Systems Processors Streaming Media Solutions Inbound Marketing IT service Public Cloud Licensing Uninterrupted Power Supply Professional Services USB eCommerce Distribution Presentation Vulnerability Integration Bitcoin Lifestyle Identity Theft Bluetooth Specifications Safety Data Protection Pain Points Notifications Holidays Cost Politics Virtual Reality Managed Services Provider Documents Downloads Time Management Memory Computer Accessories Automobile Display Entertainment Google Docs Emails Teamwork Heating/Cooling Experience Chromebook How To Smart Devices Redundancy Cleaning Trending Computing Infrastructure Hack Managed Services Monitors Mouse Managed IT Service How To Gaming Console Office Tips Multi-factor Authentication Telephone Video Conferencing Download Evernote Programming Virtual Assistant Webcam Statistics eWaste Text Messaging YouTube Unified Communications Settings Processor Network Congestion Start Menu Tech Terms Microchip Taxes User Error Distributed Denial of Service Mobile Technology Co-managed IT Employer Employee Relationship Gig Economy Competition Microsoft Excel Smart Phones Permissions Language Recycling Unified Threat Management Backup and Disaster Recovery Navigation G Suite Virtual Machine Remote Working Electronic Payment Computer Care Webinar Analytic Username Windows Server 2008 Screen Reader Customer Resource management Data Analysis Business Owner Product Reviews Gamification Hacks Physical Security Supply Chains Google Drive Writing Read Smart Tech Printers Relocation SQL Server Tablets Electronic Health Records IP Address Leadership Music Piracy Upload Banking GDPR Botnet Managing Risk Financial Data Spyware Mobile Payment Adminstration Pirating Information switches Memes Smartwatch Application Fiber-Optic Database Tech Sync Hypervisor Human Resources Electricity Printing Upgrades HTML LiFi Device Management Telephone System Fileless Malware Hybrid Cloud Managing IT Services Mobile Security CCTV 2FA Content Management Multi-Factor Security Proxy Server Reliable Computing Azure Surveillance Best Practives Business Managemenet Software License Trends Business Metrics Modem Computer Malfunction Strategy Telework cache Television Electronic Medical Records Transportation IT Digital Signature Work/Life Balance Fraud Tactics Term In Internet of Things Remote Workers WannaCry Deep Learning Devices Freedom of Information Microserver Visible Light Communication online Currency Directions Virtual Private Network Corporate Profile Upselling UTM Content Recording Optimization IT consulting Legislation Error Dark Web Scalability Free Resource Development IT Plan Enterprise Resource Planning SSID Motion Sickness FinTech Assessment SharePoint Video Surveillance Accountants A.I. Health IT Messenger Tracking Tip of the week Get More Done Saving ZTime LinkedIn email scam Addiction Processing Data Storage PDF Google Calendar Touchscreen News Turn Key Advertising Flash Wasting Time Procurement VoIP Printer Server CIO Rental Service Logistics Best Available Virtual Machines Reviews Keyboard Debate Windows XP Archive Wireless Headphones Bookmark Cabling Domains Knowledge Harddrive Trojan Staffing Google Wallet Skype Migration Connected Devices Web Server Cyber security Organization Consultation Equifax Fleet Tracking Books Employer/Employee Relationships Workers Communitications Public Speaking Society Network Management Google Play Administrator Telephone Service PCI DSS Technology Tips GPS Organize Displays Shopping Shortcut Fake News External Harddrive Managing Costs Supply Chain Management Audit Micrsooft Point of Contact Device security MSP Microsoft 365 Supercomputer Nanotechnology Social Network Browsers Worker Internet Service Provider Troubleshooting Drones Desktop Finance Medical IT Trend Micro AI Entrepreneur Data Warehousing Startup Asset Tracking User Tip Reading Proactive Maintenance Samsung IT Assessment HIPAA Emergency Hard Drive Disposal Thin CLient Business Cards Service Level Agreement Security Cameras Threats Regulations Compliance Environment Access 3D Ebay Productuvuty Managing Stress Regulation CES 3D Printing CrashOverride Personal Information Capital Financial

toner1