wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY RISKS OF REMOTE WORKING

profile
Khadija Shaikh
Jul 08, 2022
0 Likes
0 Discussions
104 Reads

Thanks to major advancements in technology, the modern workforce is no longer tied to a single location and is able to work from virtually anywhere in the world. This remote work revolution has changed lives, enabling employees to develop a healthier work/life balance and put their best foot forward, while employers enjoy the cost savings of not having to pay for physical office space and the ability to hire from a much larger talent pool. In light of COVID-19, remote work has taken on even greater significance, enabling businesses to weather economic uncertainty and workers to keep their jobs without having to put their health on the line. It’s safe to say that remote work arrangements aren’t going away any time soon — quite the opposite, in fact. That means that organizations need to figure out how to maintain security when employees work remotely.
Even under the best of circumstances, remote work can present certain security challenges.
o    Unsecured Wi-Fi networks: Accessing corporate data and systems from poorly secured public or home Wi-Fi networks could open up a corporate network to unauthorized access.
o    Bring your own device: The increasingly common practice of using personal devices such as laptops or smartphones for work creates a proliferation of devices that may not adhere to corporate security protocols.
o    Human factors: Human nature presents one of the largest security risks. Employees who lack an understanding of security risks may be susceptible to cyber attacks such as phishing scams. Or, distracted employees could unknowingly expose their login credentials in a public space.
o    Lack of training: A lack of remote work security awareness and training. Employees who are not trained in security best practices are more likely to use weak passwords and expose their company to risks in other ways.
o    Decreased visibility: When employees work in remote locations, the IT staff lacks visibility into the endpoints employees are using and potentially risky user behaviour.


Comments ()


Sign in

Read Next

Computer Forensics and its Impact in Business Environment

Blog banner

Blog on Smartsheet.

Blog banner

Direct Memory Access

Blog banner

Different Types of Data

Blog banner

Challenges and risks in service operations

Blog banner

Introduction my self

Blog banner

Broken Authentication Attacks

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Cache Memory

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Docker Framework

Blog banner

Information Technology In E- Commerce

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Importance of Website

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

MY FIRST BLOG?

Blog banner

TRIGGERS IN DATABASE

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Gis in agriculture and farming

Blog banner

GIS REMOTE SENSING

Blog banner

MENDELEY

Blog banner

INTRODUCTION TO C#

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Modern operating system

Blog banner

Cyber Forensics

Blog banner

Service Design Model

Blog banner

virtual machine

Blog banner

Principles of Concurrency

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

INTERNET SECURITY

Blog banner

Real-time Scheduling - 53003230061

Blog banner

LTE Technology

Blog banner

Operating system

Blog banner

Developments in Modern Operating Systems

Blog banner

Optimization of operating system design

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Cyber Security Control

Blog banner

Full Disk Encryption

Blog banner

Constrained Management in IT

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner