SYS-CON MEDIA Authors: Liz McMillan, Elizabeth White, Maria C. Horton, Andy Thurai, Zakia Bouachraoui

Article

Remote Workers Increase Challenges in Cybersecurity

Cybersecurity Gets More Complicated with Remote Workers

Remote work has become a consistent trend over the last few years with the number of freelancers and employees working (at least part-time) from home increasing quickly. According to predictions from 2017 research, 58 percent of the U.S. workforce will be freelancing at least some of the time by 2027.

This rapid increase in flexible work is exciting, but comes with some unique cyber security challenges. Many businesses, especially those with few employees, don’t fully understand the cybersecurity threats they face with their remote employees. Unfortunately, this exposes them to higher threat risk.

“Remote workers are a known weak link in almost every organization’s security profile, which is why threat actors target them,”says Justin Dolly, CISO of Malwarebytes. “The farther away from the typical corporate network you get, the less security there is protecting the users. There has always been a challenge managing endpoints, especially with the advent of Bring Your Own Device (BYOD) some years ago.”

With remote workers popping up all over the globe, targeted attacks are growing more sophisticated and frequent.

Common Cybersecurity Threats

All business owners should strive to understand the most common threats, particularly those targeting remote work. Here are some key findings for remote workers and their cybersecurity risks.

Unsecured Connections

Remote workers typically log onto an enterprise server with their own internet, or worse—with public Wi-Fi. Hackers often use public Wi-Fi and unsecured home connections to gain access to sensitive work information.

Even if you require your employees to use a virtual private network (VPN), it’s difficult to enforce this practice. There’s also the risk that hackers will gain access to the VPN through a single employee and consequently access information on the entire network.

Weak Passwords

Weak passwords are one of the most common entry points for hackers targeting remote workers. Many employees use the same password for everything, or they keep a file or paper record of all their passwords. Once that code is cracked, hackers can gain entry to the company networks.

Ignorance to Threats

People often don’t realize the threats facing enterprises, especially when they’re located far from the hub. Millennials are particularly ignorant to these threats.

"Millennials in the workplace have a different perspective on the sensitivity of information, information-sharing and the ramifications of personal data being shared within a corporate environment," Morey Haber, a vice president of technology a cybersecurity companytold Society for Human Resource Management. It’s the ignorance of these employees and others that enable third-party hacking success.

Mitigating Cybersecurity Threats

Understanding the threats facing your remote workers is only the beginning. If you wish to survive an attack, knowing how to mitigate your risk is vital.

Evolve With the Technology

Technology is evolving to match the threats that come our way, but we have to adopt prevention tech if we wish to protect our organizations.

“The most critical data is moving to the cloud,”suggests an article from Cato Networks, an SD-WAN company dedicated to increasing security among enterprises. “Optimized, secure access to the Internet and cloud from your places of business is a must, but you also need to take into consideration employees accessing the cloud at home or in public places. Tools such as firewalls, data encryption, two-factor authentication, and a VPN can help, while consistent employee training on best practices for secure remote working is also key.”

Research top technology offerings for cybersecurity, and invest in what will offer robust protection to your organization.

Train Employees

Since most of the threats facing remote workers involve employee ignorance, simple training measures could be all you need to mitigate risk. Webinars, cybersecurity training courses, company memos, and more can be utilized to keep employees in the loop.

Also, create a group of policies and procedures that employees should follow to prevent an attack. Everyone hopes that these instances will never happen, but you’ll be glad you were prepared if it does.

Write an Action Plan

Companies that survive an attack do so because they had a clear set of policies and proceduresoutlined in an action plan beforehand. Each organization, whether fully or partially online, should have such a strategy ready for action when an attack hits.

Distribute a copy of the plan to each member of your team, both in-house and remotely. Cover key aspects in your regular trainings, and encourage employees to ask questions and further research cybersecurity measures. Their engagement in your cybersecurity action plan will be key to promoting a safer business.

More Stories By Larry Alton

Larry Alton is an independent business consultant specializing in social media trends, business, and entrepreneurship. Follow him on Twitter and LinkedIn.

Latest Stories
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
According to the IDC InfoBrief, Sponsored by Nutanix, “Surviving and Thriving in a Multi-cloud World,” multicloud deployments are now the norm for enterprise organizations – less than 30% of customers report using single cloud environments. Most customers leverage different cloud platforms across multiple service providers. The interoperability of data and applications between these varied cloud environments is growing in importance and yet access to hybrid cloud capabilities where a single appl...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundat...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Sold by Nutanix, Nutanix Mine with Veeam can be deployed in minutes and simplifies the full lifecycle of data backup operations, including on-going management, scaling and troubleshooting. The offering combines highly-efficient storage working in concert with Veeam Backup and Replication, helping customers achieve comprehensive data protection for all their workloads — virtual, physical and private cloud —to meet increasing business demands for uptime and productivity.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, highlighted the current challenges of these transformative technologies and shared strategies for preparing your organization for these changes. This “view from the top” outlined the latest trends and developments i...