wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY RISKS OF REMOTE WORKING

profile
Khadija Shaikh
Jul 08, 2022
0 Likes
0 Discussions
104 Reads

Thanks to major advancements in technology, the modern workforce is no longer tied to a single location and is able to work from virtually anywhere in the world. This remote work revolution has changed lives, enabling employees to develop a healthier work/life balance and put their best foot forward, while employers enjoy the cost savings of not having to pay for physical office space and the ability to hire from a much larger talent pool. In light of COVID-19, remote work has taken on even greater significance, enabling businesses to weather economic uncertainty and workers to keep their jobs without having to put their health on the line. It’s safe to say that remote work arrangements aren’t going away any time soon — quite the opposite, in fact. That means that organizations need to figure out how to maintain security when employees work remotely.
Even under the best of circumstances, remote work can present certain security challenges.
o    Unsecured Wi-Fi networks: Accessing corporate data and systems from poorly secured public or home Wi-Fi networks could open up a corporate network to unauthorized access.
o    Bring your own device: The increasingly common practice of using personal devices such as laptops or smartphones for work creates a proliferation of devices that may not adhere to corporate security protocols.
o    Human factors: Human nature presents one of the largest security risks. Employees who lack an understanding of security risks may be susceptible to cyber attacks such as phishing scams. Or, distracted employees could unknowingly expose their login credentials in a public space.
o    Lack of training: A lack of remote work security awareness and training. Employees who are not trained in security best practices are more likely to use weak passwords and expose their company to risks in other ways.
o    Decreased visibility: When employees work in remote locations, the IT staff lacks visibility into the endpoints employees are using and potentially risky user behaviour.


Comments ()


Sign in

Read Next

Virtual Machine's

Blog banner

Cyber Forensics

Blog banner

SNAPCHAT

Blog banner

Race condition

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Social engineering in cyber security

Blog banner

Operating system

Blog banner

"Mahakali cave"

Blog banner

To-Do List In LISP

Blog banner

Importance of Network Security Risk

Blog banner

E-commerce

Blog banner

Types of Threads

Blog banner

What is Spyware? and examples of them.

Blog banner

Disk Scheduling

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

DISK SCHEDULING

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Internet of Things

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Race Conditions

Blog banner

Social media

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

World end

Blog banner

Senseless Teeths

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Ambiguous

Blog banner

Apache Kafka

Blog banner

Visualization in Data Science

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

File sharing

Blog banner

Elements and Principles of Photography

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Network Security Risks

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Uniprocessor Scheduling

Blog banner

Memory Management

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Mumbaicha Dabbawalla

Blog banner

internet email and it's applications

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

computer security

Blog banner