Get on top of this now if any of your staff are hybrid working • Blisstech Solutions

Laptop on a desk with a picture of a hand holding a globe

People are increasingly doing their work remotely and hybrid working has become the new norm.

Despite the fact that it has been more than two years since many of us were forced to work from home, too many organisations still do not have the appropriate cyber security precautions in place for workers who are away from the workplace, according to a recent poll.

The poll was initially designed to discover consumer spending plans for the next year. However, the findings showed how few businesses have adequate cyber security measures in place to deal with hybrid working.

And it’s a worry.

Cyber security breaches, such as malware, ransomware, and data breaches, have become more common since the start of the pandemic. Cybercriminals took advantage of the panic to begin with, and they’ve subsequently improved their techniques.

It’s wasting businesses millions of dollars while also causing significant downtime.

While the poll revealed that about two-thirds of organisations have decent web security measures in place, such as malware checks, other findings were more disheartening.

Only 50% of businesses currently have a cloud-based cyber security system in place (though 15% are exploring their options).

Businesses that use cloud technologies may benefit from numerous layers of security across their network and infrastructure, which helps to keep data safer during breaches or assaults.

It’s not only a good defence, but it also identifies problems before they become an issue.

The poll also showed that 10% of firms will use access management, which restricts access to only the appropriate people.

Another 9% intend to prioritise VPNs (Virtual Private Networks) in order to allow secure network access for remote workers.

They’re also studying zero-trust solutions, in which your network assumes every device or connection is a danger until it’s proven otherwise.

Of course, we recommend that you already have these security measures in place, particularly if you have remote or hybrid staff.

If not, this is something to take action on quickly. All you need to do is get in touch. We can help.

More Content

Outdated backup systems could leave your business vulnerable

Outdated backup systems could leave your business vulnerable

When did you last review your business’s backup tools? Outdated backup systems can fail to protect you from modern threats, like ransomware attacks. If you want a reliable backup system, here’s what you need to know…

How to use crossreferences in Word

Tech Tip: How to use cross references in Word

Today's Two Minute Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you need to refer to other places in the...
Businesses are taking too long to fix vulnerabilities

Businesses are taking too long to fix vulnerabilities

If you knew your systems were at risk of attack, you’d jump in and get things locked down fast – right? Actually… many businesses take too long to fix vulnerabilities. Here’s why that’s a problem.

Scam hazard signs

How to spot a scam

Would you know how to recognise a scam? In the 21st century, you are highly unlikely to encounter a con artist in the street as they hide behind phones, text messages and emails.  But the motivations behind 21st-century fraudsters have not changed; they want to make...

Tech Tip: Understanding Microsoft work and personal accounts

Welcome to another Blisstech Solutions Tuesday Tech Tip! Have you set up both a personal and work Microsoft account and are now running into problems when you are trying to work as you can't work out which account you are logged in with?  You are not alone and we see...

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...

Tech Tip: How to create private Teams and channels

Welcome to a new Tuesday tech tip video. This one shows you how to create private Teams and channels in Microsoft Teams. Microsoft Teams is a powerful tool for collaboration, but how do you limit access to what people can see? The answer: Private Teams and private...

Tech Tip: Master Your Multitasking – Switching Apps and Desktops Like a Pro

Welcome to a new Tuesday tech tip video where I will show you how to switch between applications and desktops in Windows quickly. Sick of losing track of what you're doing because you have too many windows open? Let's face it: we've all been there. Well, this video is...
New phishing scam is smarter than ever… here’s how to protect your business

New Microsoft 365 phishing scam is smarter than ever… here’s how to protect your business

Microsoft is warning business owners that trusted cloud storage services are being hijacked to trick you into handing over your data. Here we tell you what you need to know.

BEC attacks illustrated. Image of a hacker standing behind a computer looking menacing

Business Email Compromise (BEC) attacks are rising

Business Email Compromise (BEC) has emerged as a significant threat to businesses worldwide in recent years. As of March 2025, there has been a staggering 30% increase in BEC attacks. In late February 2025, Microsoft Defender identified nearly 2 million phishing...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05