Homeworking is bad for IT security • Blisstech Solutions

A woman looking at her phone while working from home

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture.

It has uncovered several interesting statistics, such as:

  • A huge problem with password reuse; 93% of respondents say they use the same password for business and personal use.
  • 29% admitted allowing other members of their family to use corporate IT systems for personal use.
  • 77% of remote employees are using potentially insecure personal devices to access corporate systems.

The information in this report shows a clear need for better security management for remote working.

Secure Homeworking is Possible

Many small businesses don’t realise that it is possible to centrally enforce security controls on corporate AND personal devices.  You can gain control over what users can do on work devices and personal devices when accessing corporate applications and data. By using a combination of technologies, you can centrally control:

  • Security policies on business issued devices. These include screen lock time out, disk encryption, removable devices and web surfing, to name but a few.
  • How corporate applications are accessed on personal devices, known as Bring Your Own Device (BYOD). For example, you can allow access to corporate applications from personal mobile devices but mandate that certain security levels must first be met. For example, you can require a PIN to be configured on the device and check that it is not jailbroken (cracked) before allowing access.
  • You can segregate personal and company data. Company data is given an additional layer of protection and stored separately from personal data. This allows company data to be wiped remotely from a personal device, without touching the user’s personal data, if the device is lost, or an employee leaves the organisation.

You can use Sophos, Microsoft Intune, or a combination of the two. This provides a holistic and robust solution that will ensure your company security requirements are enforced, regardless of where your users work or which devices they use.
 
It should also be said that educating your users on what is required of them from a cybersecurity point of view is more important now than ever.

Want to know more? Contact us or arrange a call.

More Content

HRMC Crown

The tax relief few businesses know about

A quick summary: When you buy certain new equipment (including computers) you can claim 130% capital allowance What that means: If you spend £1,000 on computer equipment, it'll reduce your corporation tax bill as if you had spent £1,300 How long does it last? It will...

Learn how to talk tech with our Jargon Buster

Do you find IT terminology difficult to comprehend? To ensure effective communication with our clients, we strive to avoid using technical jargon. However, having a basic understanding of some IT terminologies may prove advantageous in seeking IT assistance in the...
Microsoft: Criminals can access your accounts without your password

Microsoft: Criminals can access your accounts without your password

Just when you think you’ve got cyber security sorted for your business, a new scam comes along. This time, cyber criminals don’t even need to trick you out of your password to access your accounts… they can fool you with something called a “device code”.

Tech Tip: Using Microsoft Teams Keyboard Shortcuts

Microsoft Teams is a great productivity tool. It has many features that can help you be more productive and speed up repetitive tasks. One way to be even more productive with Microsoft Teams is to use the shortcut keys. The shortcut keys can help you quickly access...
Video thumbnail

Tech Tip: Quickly add lines numbers and bullets in Word

Happy Tuesday everyone! Today's Tech Tip is a tip on how to use some of the formatting shortcuts in Word to add lines, bullets and numbers to organise your documents. If you use Word to write your documents, and 90% of people do, you will love this tip as it will show...
The BEST protection against ransomware

The BEST protection against ransomware

Ransomware attacks – where hackers steal your data and demand a ransom to give it back – are skyrocketing. You need to have the very best protection in place to keep your data secure. And here’s what that protection is…

Are you using the all-new Teams yet?

Tired of waiting for Teams to load? Microsoft has heard your frustration and has rebuilt it from the ground up. The all-new Teams is faster and uses less memory; we give you all the details

Take action to avoid a devious new phishing scam

Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.

A drawing of two MSPs passing a baton to signify changing IT Service Provider

How to Change Your IT Service Provider: A Guide

Research from Analysis Mason shows that in 2024, nearly a quarter of small to medium-sized businesses changed their IT managed services provider (MSP). So, if you have found this article because you are concerned about the pitfalls of changing MSPs, don't worry; this...

Tech Tip: The Power of Microsoft To Do

Hello everyone and welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you want to get more organised?    👉 Do you wish you could see all of the things that you need to remember all in one place?    👉 Do you need a tool...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05