Homeworking is bad for IT security • Blisstech Solutions

A woman looking at her phone while working from home

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture.

It has uncovered several interesting statistics, such as:

  • A huge problem with password reuse; 93% of respondents say they use the same password for business and personal use.
  • 29% admitted allowing other members of their family to use corporate IT systems for personal use.
  • 77% of remote employees are using potentially insecure personal devices to access corporate systems.

The information in this report shows a clear need for better security management for remote working.

Secure Homeworking is Possible

Many small businesses don’t realise that it is possible to centrally enforce security controls on corporate AND personal devices.  You can gain control over what users can do on work devices and personal devices when accessing corporate applications and data. By using a combination of technologies, you can centrally control:

  • Security policies on business issued devices. These include screen lock time out, disk encryption, removable devices and web surfing, to name but a few.
  • How corporate applications are accessed on personal devices, known as Bring Your Own Device (BYOD). For example, you can allow access to corporate applications from personal mobile devices but mandate that certain security levels must first be met. For example, you can require a PIN to be configured on the device and check that it is not jailbroken (cracked) before allowing access.
  • You can segregate personal and company data. Company data is given an additional layer of protection and stored separately from personal data. This allows company data to be wiped remotely from a personal device, without touching the user’s personal data, if the device is lost, or an employee leaves the organisation.

You can use Sophos, Microsoft Intune, or a combination of the two. This provides a holistic and robust solution that will ensure your company security requirements are enforced, regardless of where your users work or which devices they use.
 
It should also be said that educating your users on what is required of them from a cybersecurity point of view is more important now than ever.

Want to know more? Contact us or arrange a call.

More Content

Save time by accessing your Android phone’s files with File Explorer

Save time by accessing your Android phone’s files with File Explorer

A new feature in Windows 11 may make accessing files on your Android phone much quicker. We have all the details.

Be more productive with these Microsoft Edge features

Be more productive with these Microsoft Edge features

In the never-ending mission to be more productive, the latest Microsoft Edge browser could be a powerful ally. We’re telling you about 5 of its best productivity features.

A laptop and tablet taking a backup

Two simple steps to protect your business data

Data is the lifeblood of most modern businesses.  From important proposals and presentations to a simple one-line email that is proof of something happening that you might need months later.  However, many small businesses are not taking the necessary steps and...
Bridging the trust gap between your employees and AI

Bridging the trust gap between your employees and AI

Have you noticed your employees are reluctant to use AI in the workplace? It may be down to their lack of trust. We explain how to show them AI is a tool that makes work better for everyone.

Tech Tip: How to managed Focused and Junk email in Outlook

Welcome to a new Tuesday Two Minute Tech Tip that will help you to manage what you see in your Inbox. Are you wondering where your emails have gone? Is something you expect to see in your Inbox not arriving anymore? This video will show you how to:    👉...

Windows 11 Upgrade Requirements

The termination of support for Windows 10 by Microsoft in October 2025 means that business leaders need to plan for the transition to Windows 11, and this means understanding the Windows 11 upgrade requirements. Upgrading from Windows 10 to 11 is free, however,...
Pirated software thumbnail

Don’t walk the plank with pirated software

A huge number of small and medium-sized businesses would consider using pirated software to try and save money. Don’t do it.

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.

How to cheat (the Blue Screen of) Death

The Blue Screen of Death and how to avoid it

The dreaded Blue Screen of Death makes you panic about what happened, how much work you’ve lost, and how long it’ll take to fix. But a lot of the time it’s avoidable… We’ll tell you how.

Power Automate and Flows Thumbnail

Tech Tip: What is Microsoft Power Automate?

Welcome to a new Tuesday tech tip video where I will give you a quick introduction to Microsoft Power Automate. We all want to streamline our work life and make ourselves more productive. Well, if you use Microsoft 365, you can do just that by using Power Automate....
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05