SYS-CON MEDIA Authors: Elizabeth White, Greg Ness, Sean Houghton, Glenn Rossman, Ignacio M. Llorente

Blog Feed Post

Blurred lines pose new challenges for SME security

- Two-thirds of small business employees take their work home

- Less than half believe they can spot obvious scams and threats online

February 14th, London, UK - The shifting boundaries between work and home life mean staff at many small businesses are unwittingly putting their employers at risk of cyber-attack. 82 per cent of small business employees use work time for personal matters, over a third of them for more than two hours a day, according to a survey carried out by TalkTalk Business.

TalkTalk Business surveyed 1,000 small business employees, of whom over 70 per cent admit taking work home on evenings and weekends, clocking up an average of 1.7 hours each day. With business commitments creeping into personal time, the vast majority of employees (82 per cent) are redressing the balance themselves by also catering to personal needs at work. Given that less than half of respondents feel they can spot obvious scams, this blurring of work and personal life has the potential to cause security headaches.

Modern scams are extremely complex, and men appear less confident in their ability to identify them than women: 40 per cent of men say they're easily able to recognise threats online, compared to 50 per cent of women. Somewhat ironically, employees in IT and telecoms are the least confident in their ability to spot risky content. This could be because they are often technically-trained and understand the complexity of modern viruses, therefore are less likely to underestimate them.

Checking the news, shopping online and "life admin" - tasks like booking travel or online banking - are the most common activities done on a work computer. While some respondents acknowledge the threat these actions could pose, the majority seem unaware: just under a third, 32 per cent, said shopping online while at work may be risky to the business, and only a quarter believe streaming music or video poses a danger to the company.

"The traditional 9-5 is a fallacy", said Charles Bligh, Managing Director of TalkTalk Business. "For many people, work no longer ends at the office door, it continues on the train home or after picking up the kids from school.

"That flexibility has to work both ways. It isn't surprising to see people catering to their own personal needs in office hours, but security solutions need to evolve to reflect that change of behaviour. Malicious content is getting more advanced and harder to spot - we only need to look at recent malware targeting the NHS or Yahoo! for proof of that. With WorkSafe we're committed to helping bosses ensure they have the right systems in place to stop threats at the network perimeter, instead of allowing them in and relying purely on desktop software protection."

WorkSafe is a network-level security solution, which comes as standard as part of TalkTalk Business' Broadband packages. It protects your organisation and employees, while helping you to better control your operational expenses and improve business productivity.

NOTES TO EDITORS:

TalkTalk Business provides communications solutions to UK organisations, serving the needs of over 180,000 business and public sector customers and working with over 350 wholesale partners nationwide.

The company has been dedicated to serving the needs of its customers across the UK since 1993. TalkTalk Business provides a full range of communications products including Access, Mobile, Call Handling Solutions, IP Telephone Systems, IT Networking & Security and Wholesale Business Broadband (L2TP).

Following an investment of over £600M, TalkTalk Business has designed, built and now operates Britain's biggest Next Generation Network, with 95% coverage across the UK, for broadband and voice.

Contact details:
Steve Cownie
Good Relations Technology
[email protected] / [email protected]
0207 861 3933

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...
Lori MacVittie is responsible for education and evangelism of application services available across F5's entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senio...
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionalit...
SYS-CON Media announced today that Skytap blog on "DevOps Journal" exceeded 84,000 story reads. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done. Noel Wurst is the managing content editor at Skytap. Skytap provides SaaS-based dev/test environments to the enterprise. Skytap solution removes the inefficiencies and constraints that comp...