Welcome!

Article

Remote Workers Increase Challenges in Cybersecurity

Cybersecurity Gets More Complicated with Remote Workers

Remote work has become a consistent trend over the last few years with the number of freelancers and employees working (at least part-time) from home increasing quickly. According to predictions from 2017 research, 58 percent of the U.S. workforce will be freelancing at least some of the time by 2027.

This rapid increase in flexible work is exciting, but comes with some unique cyber security challenges. Many businesses, especially those with few employees, don’t fully understand the cybersecurity threats they face with their remote employees. Unfortunately, this exposes them to higher threat risk.

“Remote workers are a known weak link in almost every organization’s security profile, which is why threat actors target them,”says Justin Dolly, CISO of Malwarebytes. “The farther away from the typical corporate network you get, the less security there is protecting the users. There has always been a challenge managing endpoints, especially with the advent of Bring Your Own Device (BYOD) some years ago.”

With remote workers popping up all over the globe, targeted attacks are growing more sophisticated and frequent.

Common Cybersecurity Threats

All business owners should strive to understand the most common threats, particularly those targeting remote work. Here are some key findings for remote workers and their cybersecurity risks.

Unsecured Connections

Remote workers typically log onto an enterprise server with their own internet, or worse—with public Wi-Fi. Hackers often use public Wi-Fi and unsecured home connections to gain access to sensitive work information.

Even if you require your employees to use a virtual private network (VPN), it’s difficult to enforce this practice. There’s also the risk that hackers will gain access to the VPN through a single employee and consequently access information on the entire network.

Weak Passwords

Weak passwords are one of the most common entry points for hackers targeting remote workers. Many employees use the same password for everything, or they keep a file or paper record of all their passwords. Once that code is cracked, hackers can gain entry to the company networks.

Ignorance to Threats

People often don’t realize the threats facing enterprises, especially when they’re located far from the hub. Millennials are particularly ignorant to these threats.

"Millennials in the workplace have a different perspective on the sensitivity of information, information-sharing and the ramifications of personal data being shared within a corporate environment," Morey Haber, a vice president of technology a cybersecurity companytold Society for Human Resource Management. It’s the ignorance of these employees and others that enable third-party hacking success.

Mitigating Cybersecurity Threats

Understanding the threats facing your remote workers is only the beginning. If you wish to survive an attack, knowing how to mitigate your risk is vital.

Evolve With the Technology

Technology is evolving to match the threats that come our way, but we have to adopt prevention tech if we wish to protect our organizations.

“The most critical data is moving to the cloud,”suggests an article from Cato Networks, an SD-WAN company dedicated to increasing security among enterprises. “Optimized, secure access to the Internet and cloud from your places of business is a must, but you also need to take into consideration employees accessing the cloud at home or in public places. Tools such as firewalls, data encryption, two-factor authentication, and a VPN can help, while consistent employee training on best practices for secure remote working is also key.”

Research top technology offerings for cybersecurity, and invest in what will offer robust protection to your organization.

Train Employees

Since most of the threats facing remote workers involve employee ignorance, simple training measures could be all you need to mitigate risk. Webinars, cybersecurity training courses, company memos, and more can be utilized to keep employees in the loop.

Also, create a group of policies and procedures that employees should follow to prevent an attack. Everyone hopes that these instances will never happen, but you’ll be glad you were prepared if it does.

Write an Action Plan

Companies that survive an attack do so because they had a clear set of policies and proceduresoutlined in an action plan beforehand. Each organization, whether fully or partially online, should have such a strategy ready for action when an attack hits.

Distribute a copy of the plan to each member of your team, both in-house and remotely. Cover key aspects in your regular trainings, and encourage employees to ask questions and further research cybersecurity measures. Their engagement in your cybersecurity action plan will be key to promoting a safer business.

More Stories By Larry Alton

Larry Alton is an independent business consultant specializing in social media trends, business, and entrepreneurship. Follow him on Twitter and LinkedIn.

Latest Stories
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
You want to start your DevOps journey but where do you begin? Do you say DevOps loudly 5 times while looking in the mirror and it suddenly appears? Do you hire someone? Do you upskill your existing team? Here are some tips to help support your DevOps transformation. Conor Delanbanque has been involved with building & scaling teams in the DevOps space globally. He is the Head of DevOps Practice at MThree Consulting, a global technology consultancy. Conor founded the Future of DevOps Thought Leade...
Jo Peterson is VP of Cloud Services for Clarify360, a boutique sourcing and benchmarking consultancy focused on transforming technology into business advantage. Clarify360 provides custom, end-to-end solutions from a portfolio of more than 170 suppliers globally. As an engineer, Jo sources net new technology footprints, and is an expert at optimizing and benchmarking existing environments focusing on Cloud Enablement and Optimization. She and her team work with clients on Cloud Discovery, Cloud ...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...