Homeworking is bad for IT security • Blisstech Solutions

A woman looking at her phone while working from home

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture.

It has uncovered several interesting statistics, such as:

  • A huge problem with password reuse; 93% of respondents say they use the same password for business and personal use.
  • 29% admitted allowing other members of their family to use corporate IT systems for personal use.
  • 77% of remote employees are using potentially insecure personal devices to access corporate systems.

The information in this report shows a clear need for better security management for remote working.

Secure Homeworking is Possible

Many small businesses don’t realise that it is possible to centrally enforce security controls on corporate AND personal devices.  You can gain control over what users can do on work devices and personal devices when accessing corporate applications and data. By using a combination of technologies, you can centrally control:

  • Security policies on business issued devices. These include screen lock time out, disk encryption, removable devices and web surfing, to name but a few.
  • How corporate applications are accessed on personal devices, known as Bring Your Own Device (BYOD). For example, you can allow access to corporate applications from personal mobile devices but mandate that certain security levels must first be met. For example, you can require a PIN to be configured on the device and check that it is not jailbroken (cracked) before allowing access.
  • You can segregate personal and company data. Company data is given an additional layer of protection and stored separately from personal data. This allows company data to be wiped remotely from a personal device, without touching the user’s personal data, if the device is lost, or an employee leaves the organisation.

You can use Sophos, Microsoft Intune, or a combination of the two. This provides a holistic and robust solution that will ensure your company security requirements are enforced, regardless of where your users work or which devices they use.
 
It should also be said that educating your users on what is required of them from a cybersecurity point of view is more important now than ever.

Want to know more? Contact us or arrange a call.

More Content

HRMC Crown

The tax relief few businesses know about

A quick summary: When you buy certain new equipment (including computers) you can claim 130% capital allowance What that means: If you spend £1,000 on computer equipment, it'll reduce your corporation tax bill as if you had spent £1,300 How long does it last? It will...

Charging in public places? Watch out for “juice jacking”

Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go. They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge. The security risk …
Read More

Tech Tip: How to add your availability to an Outlook Email

Today's Tuesday Two Minute Tech Tip will save you time when arranging meetings. Are you wasting time when trying to book meetings by constantly going back and forth with people trying to find a suitable time? There is a better way to find time for a meeting by using...
Snip and Sketch video thumbnail

Tech Tip: How to use the Snip and Sketch tool

This is a Tech Tip on how to use the really handy Snip and Sketch Tool built into Windows. Who said that "a picture paints a thousand words"? I'll leave you to Google that one as I couldn't work it out! Anyway, there are times when an image is the best way to...

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...
Unlock your potential with Copilot

Unlock your potential with Copilot

Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here we tell you some cool ways it can help.

How future-ready is your business’s IT?

How future proof is your business’s IT?

Your business’s tech might be working well today, but is it ready for tomorrow? A new study has found more than 60% of business leaders aren’t confident about theirs. What about yours?

Tech Tip: How to use Microsoft Teams as a phone system

Welcome to a new Tuesday tech tip video. In it, I will demo the Microsoft Teams Phone system. Microsoft Teams has become a cornerstone for collaboration, offering seamless chat and meeting experiences for millions of users worldwide. But did you know that Teams can...
How many devices do you use every workday?

Gadget overload? How many devices do you use at work?

Are all the devices your team uses helping them stay productive – or hindering them? Every extra gadget means another thing to remember, charge, and carry. There’s a simple way to help streamline tech in your business…

Can your business go green by switching to the cloud?

Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making? Sorry. Bad pun. It’s true that cloud services have environmental benefits compared …
Read More

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05