wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY RISKS OF REMOTE WORKING

profile
Khadija Shaikh
Jul 08, 2022
0 Likes
0 Discussions
104 Reads

Thanks to major advancements in technology, the modern workforce is no longer tied to a single location and is able to work from virtually anywhere in the world. This remote work revolution has changed lives, enabling employees to develop a healthier work/life balance and put their best foot forward, while employers enjoy the cost savings of not having to pay for physical office space and the ability to hire from a much larger talent pool. In light of COVID-19, remote work has taken on even greater significance, enabling businesses to weather economic uncertainty and workers to keep their jobs without having to put their health on the line. It’s safe to say that remote work arrangements aren’t going away any time soon — quite the opposite, in fact. That means that organizations need to figure out how to maintain security when employees work remotely.
Even under the best of circumstances, remote work can present certain security challenges.
o    Unsecured Wi-Fi networks: Accessing corporate data and systems from poorly secured public or home Wi-Fi networks could open up a corporate network to unauthorized access.
o    Bring your own device: The increasingly common practice of using personal devices such as laptops or smartphones for work creates a proliferation of devices that may not adhere to corporate security protocols.
o    Human factors: Human nature presents one of the largest security risks. Employees who lack an understanding of security risks may be susceptible to cyber attacks such as phishing scams. Or, distracted employees could unknowingly expose their login credentials in a public space.
o    Lack of training: A lack of remote work security awareness and training. Employees who are not trained in security best practices are more likely to use weak passwords and expose their company to risks in other ways.
o    Decreased visibility: When employees work in remote locations, the IT staff lacks visibility into the endpoints employees are using and potentially risky user behaviour.


Comments ()


Sign in

Read Next

Twisted world

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Never give up

Blog banner

LINUX

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Business Intelligence v/s Big Data

Blog banner

An Overview of Virtual Machines

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Memory Management

Blog banner

Love is in air.....

Blog banner

Riddhi Miyani 53003220140

Blog banner

Memory managment

Blog banner

Lucidchart

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Memory management and virtual memory

Blog banner

MUTUAL EXCLUSION

Blog banner

E-learning

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Pipedrive

Blog banner

Sagar Parikrama

Blog banner

Hacking of web server and application

Blog banner

LIFEHACKER

Blog banner

gis substation

Blog banner

Deadlock in Operating systems

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Record Blocking

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

Odoo

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Honeypot in cyber security

Blog banner

Threat management

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

What is Spyware?

Blog banner

BITCOIN WALLET

Blog banner

EMAIL INVESTIGATION

Blog banner

Real Time Scheduling

Blog banner

Virtual memory

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner