Welcome!

Blog Feed Post

Blurred lines pose new challenges for SME security

- Two-thirds of small business employees take their work home

- Less than half believe they can spot obvious scams and threats online

February 14th, London, UK - The shifting boundaries between work and home life mean staff at many small businesses are unwittingly putting their employers at risk of cyber-attack. 82 per cent of small business employees use work time for personal matters, over a third of them for more than two hours a day, according to a survey carried out by TalkTalk Business.

TalkTalk Business surveyed 1,000 small business employees, of whom over 70 per cent admit taking work home on evenings and weekends, clocking up an average of 1.7 hours each day. With business commitments creeping into personal time, the vast majority of employees (82 per cent) are redressing the balance themselves by also catering to personal needs at work. Given that less than half of respondents feel they can spot obvious scams, this blurring of work and personal life has the potential to cause security headaches.

Modern scams are extremely complex, and men appear less confident in their ability to identify them than women: 40 per cent of men say they're easily able to recognise threats online, compared to 50 per cent of women. Somewhat ironically, employees in IT and telecoms are the least confident in their ability to spot risky content. This could be because they are often technically-trained and understand the complexity of modern viruses, therefore are less likely to underestimate them.

Checking the news, shopping online and "life admin" - tasks like booking travel or online banking - are the most common activities done on a work computer. While some respondents acknowledge the threat these actions could pose, the majority seem unaware: just under a third, 32 per cent, said shopping online while at work may be risky to the business, and only a quarter believe streaming music or video poses a danger to the company.

"The traditional 9-5 is a fallacy", said Charles Bligh, Managing Director of TalkTalk Business. "For many people, work no longer ends at the office door, it continues on the train home or after picking up the kids from school.

"That flexibility has to work both ways. It isn't surprising to see people catering to their own personal needs in office hours, but security solutions need to evolve to reflect that change of behaviour. Malicious content is getting more advanced and harder to spot - we only need to look at recent malware targeting the NHS or Yahoo! for proof of that. With WorkSafe we're committed to helping bosses ensure they have the right systems in place to stop threats at the network perimeter, instead of allowing them in and relying purely on desktop software protection."

WorkSafe is a network-level security solution, which comes as standard as part of TalkTalk Business' Broadband packages. It protects your organisation and employees, while helping you to better control your operational expenses and improve business productivity.

NOTES TO EDITORS:

TalkTalk Business provides communications solutions to UK organisations, serving the needs of over 180,000 business and public sector customers and working with over 350 wholesale partners nationwide.

The company has been dedicated to serving the needs of its customers across the UK since 1993. TalkTalk Business provides a full range of communications products including Access, Mobile, Call Handling Solutions, IP Telephone Systems, IT Networking & Security and Wholesale Business Broadband (L2TP).

Following an investment of over £600M, TalkTalk Business has designed, built and now operates Britain's biggest Next Generation Network, with 95% coverage across the UK, for broadband and voice.

Contact details:
Steve Cownie
Good Relations Technology
[email protected] / [email protected]
0207 861 3933

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
"We view the cloud not really as a specific technology but as a way of doing business and that way of doing business is transforming the way software, infrastructure and services are being delivered to business," explained Matthew Rosen, CEO and Director at Fusion, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...