Homeworking is bad for IT security • Blisstech Solutions

A woman looking at her phone while working from home

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture.

It has uncovered several interesting statistics, such as:

  • A huge problem with password reuse; 93% of respondents say they use the same password for business and personal use.
  • 29% admitted allowing other members of their family to use corporate IT systems for personal use.
  • 77% of remote employees are using potentially insecure personal devices to access corporate systems.

The information in this report shows a clear need for better security management for remote working.

Secure Homeworking is Possible

Many small businesses don’t realise that it is possible to centrally enforce security controls on corporate AND personal devices.  You can gain control over what users can do on work devices and personal devices when accessing corporate applications and data. By using a combination of technologies, you can centrally control:

  • Security policies on business issued devices. These include screen lock time out, disk encryption, removable devices and web surfing, to name but a few.
  • How corporate applications are accessed on personal devices, known as Bring Your Own Device (BYOD). For example, you can allow access to corporate applications from personal mobile devices but mandate that certain security levels must first be met. For example, you can require a PIN to be configured on the device and check that it is not jailbroken (cracked) before allowing access.
  • You can segregate personal and company data. Company data is given an additional layer of protection and stored separately from personal data. This allows company data to be wiped remotely from a personal device, without touching the user’s personal data, if the device is lost, or an employee leaves the organisation.

You can use Sophos, Microsoft Intune, or a combination of the two. This provides a holistic and robust solution that will ensure your company security requirements are enforced, regardless of where your users work or which devices they use.
 
It should also be said that educating your users on what is required of them from a cybersecurity point of view is more important now than ever.

Want to know more? Contact us or arrange a call.

More Content

A laptop and tablet taking a backup

Two simple steps to protect your business data

Data is the lifeblood of most modern businesses.  From important proposals and presentations to a simple one-line email that is proof of something happening that you might need months later.  However, many small businesses are not taking the necessary steps and...

Tech Tip: How to Stay Cyber Safe at Christmas

CHRISTMAS SPECIAL!!! As we are on the countdown to Christmas, today's Tuesday Two Minute Tech Tip is on a (very tenuous) Christmas theme. As we all get ready for the big day we will be thinking of having a few days or even weeks off work and relaxing. Christmas is a...
Is this the most dangerous phishing scam yet?

Is SubdoMailing the most dangerous phishing scam yet?

Bad news: Cyber criminals have yet another new phishing scam up their sleeves and it could be the most dangerous one yet. They’re using genuine subdomains that have been abandoned. We tell you how to stay safe.

How to get faster Wi-Fi in your office and for remote workers

The quickest way to upset your staff is by giving them slow access to the internet. Bad Wi-Fi quickly creates tension in the team and is a real productivity killer. You don’t have to suffer slow Wi-Fi. Here’s our guide to making Wi-Fi faster whether you’re working in...
If Microsoft can pull this off, it’ll change your workflow forever

Windows Agent Arena – If Microsoft can pull this off, it’ll change work forever

Wouldn’t it be great if your Windows 11 computer could handle tasks like a real-life assistant? Soon it might be able to and we’ll tell you all about it here.

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...
You’re not imagining it, video calls ARE stressful

You’re not imagining it, video calls ARE stressful

Video calls stressing you out? You’re not alone. Scientists have warned about the negative effects of too much camera time. We have the solution for your team.

Browse with confidence: Microsoft Edge’s Enhanced Security

Microsoft is working on a major security update for its Edge browser, which will bring Edge enhanced security to everyone using it.

90% of cyber attacks start with a simple email. Why?

All it takes is one email... Did you know it can just take one email to bring your entire business to its knees? Why? Because a surprising 90% of cyber attacks begin with an email. And if you and your whole team are reliant on email every day, your chances of falling...

Tech Tip: Master Your Multitasking – Switching Apps and Desktops Like a Pro

Welcome to a new Tuesday tech tip video where I will show you how to switch between applications and desktops in Windows quickly. Sick of losing track of what you're doing because you have too many windows open? Let's face it: we've all been there. Well, this video is...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05