AllLattes, lunch, and VPNs: securing remote workers the right way
Lattes, lunch, and VPNs: securing remote workers the right way
i LATTES, LUNCH, AND VPNS: SECURING REMOTE WORKERS THE RIGHT WAY
“Remote working habits, in combination
with the need to enable collaboration across
dispersed teams inevitably involves multiple
digital tools and mobile devices, which in turn
raise serious security concerns. However, a
well thought-out, detailed plan provides both
productivity and security.”
Malwarebytes
3
i LATTES, LUNCH, AND VPNS: SECURING REMOTE WORKERS THE RIGHT WAY
4
Introduction
I
t will come as no surprise that, despite a constant pendulum
swing in workplace trends, remote work is still booming. With
climbing real estate prices in high-opportunity cities and
clogged freeways from workers taking on long commutes, remote
work is a trend that will only continue. Yet with that workplace
flexibility comes security challenges.
“...the average number
of cybersecurity
incidents involving
employee or contractor
negligence has
increased by 26
percent and by 53
percent for criminal
and malicious insider
incidents.”
Even without remote work, cybersecurity is a growing problem for
organisations. According to the Ponemon Institute, since 2016, the
average number of cybersecurity incidents involving employee
or contractor negligence has increased by 26 percent and by 53
percent for criminal and malicious insider incidents. Remote
work has had a major impact. As a Secure Computing comment
suggests, Wi-Fi is a big culprit of security breaches. Worryingly,
further research reveals 77 percent of businesses do not have a
cybersecurity incident response plan applied consistently across
the organisation to cope with breaches.
Google recently outlined the challenges facing IT leaders who need
to secure remote workers in an internal report, Working together
when we’re not together. Remote working habits, in combination
with the need to enable collaboration across dispersed teams,
demand a well thought-out, detailed plan. That plan inevitably
involves multiple digital tools and mobile devices, which in turn
raise serious security concerns.
Please complete the form to gain access to this content