Homeworking is bad for IT security • Blisstech Solutions

A woman looking at her phone while working from home

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture.

It has uncovered several interesting statistics, such as:

  • A huge problem with password reuse; 93% of respondents say they use the same password for business and personal use.
  • 29% admitted allowing other members of their family to use corporate IT systems for personal use.
  • 77% of remote employees are using potentially insecure personal devices to access corporate systems.

The information in this report shows a clear need for better security management for remote working.

Secure Homeworking is Possible

Many small businesses don’t realise that it is possible to centrally enforce security controls on corporate AND personal devices.  You can gain control over what users can do on work devices and personal devices when accessing corporate applications and data. By using a combination of technologies, you can centrally control:

  • Security policies on business issued devices. These include screen lock time out, disk encryption, removable devices and web surfing, to name but a few.
  • How corporate applications are accessed on personal devices, known as Bring Your Own Device (BYOD). For example, you can allow access to corporate applications from personal mobile devices but mandate that certain security levels must first be met. For example, you can require a PIN to be configured on the device and check that it is not jailbroken (cracked) before allowing access.
  • You can segregate personal and company data. Company data is given an additional layer of protection and stored separately from personal data. This allows company data to be wiped remotely from a personal device, without touching the user’s personal data, if the device is lost, or an employee leaves the organisation.

You can use Sophos, Microsoft Intune, or a combination of the two. This provides a holistic and robust solution that will ensure your company security requirements are enforced, regardless of where your users work or which devices they use.
 
It should also be said that educating your users on what is required of them from a cybersecurity point of view is more important now than ever.

Want to know more? Contact us or arrange a call.

More Content

How to use footnotes and endnotes in Word

Tech Tip: How to use footnotes and endnotes in Word

This Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you may need to expand on certain sentences without making the...
artificial intelligence thumbnail

Let’s start talking about Artificial Intelligence (AI)

From Alexa to Siri, AI is already all around us, but names like ChatGPT, Dall-E and Jasper have blown up the internet. Let’s decode some of the language

Microsoft plans a naming system for hackers

Microsoft plans a naming system for hackers

Hacking groups are given different names by different security companies. And that means you don’t know who’s really behind an attack so can’t react as quickly as you’d like. That’s about to change, thanks to Microsoft…

5 steps to help recover from a cyber attack

Read this BEFORE you get hit with a cyber attack The worst time to decide how to deal with a cyber-attack is when you’re in the middle of one. Unfortunately, you’ll probably need to deal with it eventually—small and medium-sized businesses are prime targets for...
How to use Format Painter thumbnail

Tech Tip: How to use Format Painter in Office 365

Welcome to a new Tuesday tech tip video where we will show you how to use a feature of Office applications called Format Painter. If you want to know how to quickly make the content of your Office documents look consistent, then this video will show you how. Format...

What is Proactive Monitoring and how can it protect your business?

How proactive monitoring will help your business weather any storm. You are the captain of your business's ship. You have a loyal and skilled team behind you. You are ready for any challenge! Or so you thought. Then, one day, without warning, a vast digital monster...

Outsourcing always beats DIY

Do you ever feel like you're juggling ten tasks at once to keep your business running? Marketing, sales, finances, IT… the list goes on! And somewhere in that chaos, your dreams for growth get lost. Enter Dave, a fellow entrepreneur who has created the same...

Security essentials: How to stop spam before it stops your business

Is your inbox already full of junk before you’ve even had your first coffee? Most people just sigh, delete, and move on. But what if one of those “junk” emails wasn’t just annoying… but dangerous? Spam has evolved. Today it’s one of the easiest ways for cyber...
Warning: Don’t ignore hardware requirements for Windows 11

Warning: Don’t ignore hardware requirements for Windows 11

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this right now… here are some important considerations before you decide what’s best for your team.

Take action to avoid a devious new phishing scam

Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05