Homeworking is bad for IT security • Blisstech Solutions

A woman looking at her phone while working from home

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture.

It has uncovered several interesting statistics, such as:

  • A huge problem with password reuse; 93% of respondents say they use the same password for business and personal use.
  • 29% admitted allowing other members of their family to use corporate IT systems for personal use.
  • 77% of remote employees are using potentially insecure personal devices to access corporate systems.

The information in this report shows a clear need for better security management for remote working.

Secure Homeworking is Possible

Many small businesses don’t realise that it is possible to centrally enforce security controls on corporate AND personal devices.  You can gain control over what users can do on work devices and personal devices when accessing corporate applications and data. By using a combination of technologies, you can centrally control:

  • Security policies on business issued devices. These include screen lock time out, disk encryption, removable devices and web surfing, to name but a few.
  • How corporate applications are accessed on personal devices, known as Bring Your Own Device (BYOD). For example, you can allow access to corporate applications from personal mobile devices but mandate that certain security levels must first be met. For example, you can require a PIN to be configured on the device and check that it is not jailbroken (cracked) before allowing access.
  • You can segregate personal and company data. Company data is given an additional layer of protection and stored separately from personal data. This allows company data to be wiped remotely from a personal device, without touching the user’s personal data, if the device is lost, or an employee leaves the organisation.

You can use Sophos, Microsoft Intune, or a combination of the two. This provides a holistic and robust solution that will ensure your company security requirements are enforced, regardless of where your users work or which devices they use.
 
It should also be said that educating your users on what is required of them from a cybersecurity point of view is more important now than ever.

Want to know more? Contact us or arrange a call.

More Content

Can your business go green by switching to the cloud?

Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making? Sorry. Bad pun. It’s true that cloud services have environmental benefits compared …
Read More

IT Managed Services for Financial Services

Over the last four decades, technology has significantly impacted how Financial Services operate. In the past, Financial Services businesses, such as IFAs and accountants, had to track financial data manually. Today, they can use software to automate many of these...
Metal work coming out of a metal apple

Do I need Antivirus on a Mac?

Broadly speaking there are two different types of desktop computer users; Windows users and Mac users (sorry Linux users but you are very much in the minority). Microsoft has included a free antivirus solution called Windows Defender for years because they realised...

Tech Tip: How to use Windows Clipboard History

Welcome to a new Tuesday tech tip video where I will show you a really cool Windows feature called Clipboard History. Do you ever find yourself copying and pasting the same text or images over and over again? If so, you're not alone. But there's a better way! Windows...
@ symbol with a hook through it

Anti-virus programs aren’t enough

Today, many business owners install an antivirus program as their single line of defence and call it a day. However, there are many ways to get into a network that circumvents anti-virus. Hackers are creating malware faster than anti-virus programs can recognise them...
Is this the most dangerous phishing scam yet?

Is SubdoMailing the most dangerous phishing scam yet?

Bad news: Cyber criminals have yet another new phishing scam up their sleeves and it could be the most dangerous one yet. They’re using genuine subdomains that have been abandoned. We tell you how to stay safe.

Tech Tip: How to Provide Remote Support for FREE with Quick Assist

This Two Minute Tech Tip shows you how to view or control someone else's screen for FREE. As an IT managed service provider we have lots of tools we have to pay for to help us support our clients. However, if you've ever been in a situation where you are trying to...
Don’t think your business is a target? Think again

Don’t think your business is a target? Think again

Cyber criminals are targeting businesses of all sizes, all the time. And new research shows just how they’re doing it. We tell you how to stay protected.

Tech Tip: The Power of Microsoft To Do

Hello everyone and welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you want to get more organised?    👉 Do you wish you could see all of the things that you need to remember all in one place?    👉 Do you need a tool...

Cloud Telephony vs. VoIP – which is best for your business?

If your employees—or worse, your customers—have started to complain about your phone systems, it’s time to look at a new solution—something that works well for everyone, whether that’s making life easier for your team or giving your customers a smoother experience....
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05