At a time when data security needs to be taken more seriously, we are living in a time with an oversaturated list of possible risks given that many of us are working remotely. 1 in 3 UK workers currently based exclusively at home, (this is the same level in the US ), remote working on a large scale consistently proves to be a difficult area for the IT and cybersecurity bosses of companies large and small around the world. Studies have shown that many firms are not taking the issue as seriously as they should.
According to a recent survey according to a recent survey by legal firm Hayes Connor Solicitors., one in five UK home workers has received no training on cyber-security. Another finding was 2 out of 3 employees who printed potentially sensitive work documents at home admitted to putting the papers in their bins without shredding them first.
A year on we are still facing cyberattacks remotely and there is cyber breach fatigue, after so many major breaches, a sense of complacency has taken hold. This comes as no surprise because, according to the Privacy Rights Clearinghouse, 9,033 data breaches have been made public since 2005, or about 1.77 breaches a day, on average.
Employees and leaders who experience breach fatigue can leave an organisation open to insider threats, ineffective security strategies, and other vulnerabilities. senior associate at Hayes Connor, Christine Sabino says “In the rush and panic to set remote working practices up, even simple data protection practices were ignored. Companies did not provide additional security relating to computers, electronic communication, phone communication.”
Ted Harrington, a San Diego-based cyber-security specialist, and author of Hackable: How To Do Application Security Right, says firms should have started by giving all home workers a dedicated work laptop. While many larger companies may well have done this, not all smaller firms necessarily have the resources to do so, but Mr Harrington emphasises the importance in doing so. He advises that organisations should supply staff with laptops and other equipment that are owned, controlled and configured by the company, for instance shredders. Doing this alleviates the burden on your people to set things up right, and ensures that employees follow the security protocols the company wants and needs.
Sam Grubb, an Arkansas-based cyber-security consultant, and author of the forthcoming book ‘How Cybersecurity Really Works’ says that employees should not be using their personal computers for work-based duties, he states that “the main problem with using your own computer to do work is that you are not limited in what you can do on it, nor are you necessarily the only one that uses it”.
“This makes it much easier for malware or other attacks to happen. This might affect the work you are doing, or in a worst-case scenario, lead to the compromise of co-workers’ devices, or other company devices such as servers.”
Mr. Harrington says that the next step is that companies must set up a VPN or virtual private network, so that remote computers have secure and encrypted connections with the firm’s servers and everyone else in the company.
Despite the correct steps being taken by organisations such as work laptops, VPNs, and the latest cyber-security software systems in place, staff can still make damaging mistakes, such as falling prey to a phishing email (to read our blog on phishing, click here)
Based on these findings, employees need to receive up to date cyber-security training on the threats that the business may face. If cyber-attacks and data breaches occur, employees must know whom to contact, and that their outreach is welcome and won’t result in termination.
Get our latest cyber intelligence insights straight into your inbox every week
Fill out the short form below to subscribe to our newsletter so that you never miss out on
our cyber intelligence insights and news.
Privacy Overview
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Orpheus is a leading cyber security company that offers predictive and actionable intelligence to clients, enabling them to anticipate, prepare for, and respond to cyber threats. Our threat intelligence is used to create threat-led cyber risk ratings, providing a more accurate assessment of risk than just analysing an organisation’s attack surface. Products include; External attack surface management, risk-based vulnerability management, third-party supply chain risk management and cyber threat intelligence. Cyber security jobs and careers.
Strictly Necessary Cookies
These cookies are strictly necessary to provide you with services available through our website and to use some of its features. These must be enabled at all times, so that we can save your preferences.
Orpheus is a leading cyber security company that offers predictive and actionable intelligence to clients, enabling them to anticipate, prepare for, and respond to cyber threats. Our threat intelligence is used to create threat-led cyber risk ratings, providing a more accurate assessment of risk than just analysing an organisation’s attack surface. Products include; External attack surface management, risk-based vulnerability management, third-party supply chain risk management and cyber threat intelligence. Cyber security jobs and careers.
If you do not enable Strictly Necessary Cookies, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
Orpheus is a leading cyber security company that offers predictive and actionable intelligence to clients, enabling them to anticipate, prepare for, and respond to cyber threats. Our threat intelligence is used to create threat-led cyber risk ratings, providing a more accurate assessment of risk than just analysing an organisation’s attack surface. Products include; External attack surface management, risk-based vulnerability management, third-party supply chain risk management and cyber threat intelligence. Cyber security jobs and careers.
3rd Party Cookies
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Orpheus is a leading cyber security company that offers predictive and actionable intelligence to clients, enabling them to anticipate, prepare for, and respond to cyber threats. Our threat intelligence is used to create threat-led cyber risk ratings, providing a more accurate assessment of risk than just analysing an organisation’s attack surface. Products include; External attack surface management, risk-based vulnerability management, third-party supply chain risk management and cyber threat intelligence. Cyber security jobs and careers.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
Orpheus is a leading cyber security company that offers predictive and actionable intelligence to clients, enabling them to anticipate, prepare for, and respond to cyber threats. Our threat intelligence is used to create threat-led cyber risk ratings, providing a more accurate assessment of risk than just analysing an organisation’s attack surface. Products include; External attack surface management, risk-based vulnerability management, third-party supply chain risk management and cyber threat intelligence. Cyber security jobs and careers.
Orpheus is a leading cyber security company that offers predictive and actionable intelligence to clients, enabling them to anticipate, prepare for, and respond to cyber threats. Our threat intelligence is used to create threat-led cyber risk ratings, providing a more accurate assessment of risk than just analysing an organisation’s attack surface. Products include; External attack surface management, risk-based vulnerability management, third-party supply chain risk management and cyber threat intelligence. Cyber security jobs and careers.
Request Demo Access
Fill out your details below and we'll be in touch to arrange demo access for you as soon as
possible.