Thank you for Subscribing to CIO Applications Weekly Brief
According to a survey, 51 percent of employed Americans have switched to working remotely due to the COVID-19 pandemic.
Fremont, CA: Many firms are trying to implement rules and security processes in the wake of the abrupt shift to remote labor. Long-term remote work arrangements are becoming more common, necessitating enhanced security measures to prevent cyberattacks and data breaches.
Remote employees are often the first to get targeted by hackers. As a result, they're frequently the cause of network security problems that swiftly spread across the rest of the company. In addition, mobile devices such as cellphones and laptops offer security issues even if the company doesn't have any remote employees. Let's see some of the top remote work security concerns that companies should know.
• MANAGING ALL DEVICES AND EMPLOYEES
Do users know what equipment is getting utilized and who is using it? It's vital to have an up-to-date inventory of devices and their users for safety monitoring.
• INSECURE PASSWORDS
It's impossible to stress the necessity of enforcing password restrictions. However, regularly implementing a system of forced password changes is a primary step that many firms overlook.
• VIDEO ATTACKS
Zoom, a popular video software, has come under fire for an increase in "Zoom-bombing," Hackers hijack video sessions to transmit dangerous information. Take the necessary procedures to keep the video calls secure.
• PHISHING EMAILS
Criminals specializing in phishing schemes get victims to provide sensitive information such as banking, credit card, and password details. In 2019, email phishing schemes cost individuals and organizations more than 3.5 billion dollars.
• WEAK BACKUP AND RECOVERY SYSTEMS
The best defense is a solid offense. A dependable backup and recovery solution can rescue the company in the worst-case situation. Having a team of professionals to help businesses transition from a break-fix attitude to a proactive maintenance program is priceless.
• USING UNSECURED PERSONAL DEVICES & NETWORKS
Everyone from freelancers and full-time workers to consultants and partners is working on a bevy of insecure devices across various operating systems and networks. As a result, they are more exposed to network attacks that are less prevalent in the workplace.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
Featured Vendors
-
Jason Vogel, Senior Director of Product Strategy & Development, Silver Wealth Technologies
James Brown, CEO, Smart Communications
Deepak Dube, Founder and CEO, Datanomers
Tory Hazard, CEO, Institutional Cash Distributors
Jean Jacques Borno, CFP®, Founder & CEO, 1787fp
-
Andrew Rudd, CEO, Advisor Software
Douglas Jones, Vice President Operations, NETSOL Technologies
Matt McCormick, CEO, AddOn Networks
Jeff Peters, President, and Co-Founder, Focalized Networks
Tom Jordan, VP, Financial Software Solutions, Digital Check Corp
Tracey Dunlap, Chief Experience Officer, Zenmonics