wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY RISKS OF REMOTE WORKING

profile
Khadija Shaikh
Jul 08, 2022
0 Likes
0 Discussions
104 Reads

Thanks to major advancements in technology, the modern workforce is no longer tied to a single location and is able to work from virtually anywhere in the world. This remote work revolution has changed lives, enabling employees to develop a healthier work/life balance and put their best foot forward, while employers enjoy the cost savings of not having to pay for physical office space and the ability to hire from a much larger talent pool. In light of COVID-19, remote work has taken on even greater significance, enabling businesses to weather economic uncertainty and workers to keep their jobs without having to put their health on the line. It’s safe to say that remote work arrangements aren’t going away any time soon — quite the opposite, in fact. That means that organizations need to figure out how to maintain security when employees work remotely.
Even under the best of circumstances, remote work can present certain security challenges.
o    Unsecured Wi-Fi networks: Accessing corporate data and systems from poorly secured public or home Wi-Fi networks could open up a corporate network to unauthorized access.
o    Bring your own device: The increasingly common practice of using personal devices such as laptops or smartphones for work creates a proliferation of devices that may not adhere to corporate security protocols.
o    Human factors: Human nature presents one of the largest security risks. Employees who lack an understanding of security risks may be susceptible to cyber attacks such as phishing scams. Or, distracted employees could unknowingly expose their login credentials in a public space.
o    Lack of training: A lack of remote work security awareness and training. Employees who are not trained in security best practices are more likely to use weak passwords and expose their company to risks in other ways.
o    Decreased visibility: When employees work in remote locations, the IT staff lacks visibility into the endpoints employees are using and potentially risky user behaviour.


Comments ()


Sign in

Read Next

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Direct Memory Access

Blog banner

A book review

Blog banner

Python as a tool for Data science task & project

Blog banner

Delhi city

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Importance of Website

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Operating System

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Danger assessment in GIS

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Evolution of operating system

Blog banner

Data Mapping

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Pink sauce pasta

Blog banner

Access management

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Question

Blog banner

Service transistion under difficult conditions

Blog banner

Man VS Nature

Blog banner

Memory Management

Blog banner

Man is free by the birth .

Blog banner

File management -disha parekh

Blog banner

Cyber Security Control

Blog banner

Ubiquitous Computing

Blog banner

Linux -V Server Virtual Machine

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Memory Management in Operating System

Blog banner

Culture Of Ladakh

Blog banner

Business Engineering

Blog banner

Know your Processors!

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

UniProcessor Scheduling

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Modern operating system

Blog banner

Security and E-mail

Blog banner

Sweet Mango Murabba

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Deadlocks in Operating Systems

Blog banner

Memory Management

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner