wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY RISKS OF REMOTE WORKING

profile
Khadija Shaikh
Jul 08, 2022
0 Likes
0 Discussions
104 Reads

Thanks to major advancements in technology, the modern workforce is no longer tied to a single location and is able to work from virtually anywhere in the world. This remote work revolution has changed lives, enabling employees to develop a healthier work/life balance and put their best foot forward, while employers enjoy the cost savings of not having to pay for physical office space and the ability to hire from a much larger talent pool. In light of COVID-19, remote work has taken on even greater significance, enabling businesses to weather economic uncertainty and workers to keep their jobs without having to put their health on the line. It’s safe to say that remote work arrangements aren’t going away any time soon — quite the opposite, in fact. That means that organizations need to figure out how to maintain security when employees work remotely.
Even under the best of circumstances, remote work can present certain security challenges.
o    Unsecured Wi-Fi networks: Accessing corporate data and systems from poorly secured public or home Wi-Fi networks could open up a corporate network to unauthorized access.
o    Bring your own device: The increasingly common practice of using personal devices such as laptops or smartphones for work creates a proliferation of devices that may not adhere to corporate security protocols.
o    Human factors: Human nature presents one of the largest security risks. Employees who lack an understanding of security risks may be susceptible to cyber attacks such as phishing scams. Or, distracted employees could unknowingly expose their login credentials in a public space.
o    Lack of training: A lack of remote work security awareness and training. Employees who are not trained in security best practices are more likely to use weak passwords and expose their company to risks in other ways.
o    Decreased visibility: When employees work in remote locations, the IT staff lacks visibility into the endpoints employees are using and potentially risky user behaviour.


Comments ()


Sign in

Read Next

Steganography and Steganalysis

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

IT RISK

Blog banner

Zoho

Blog banner

Bit Coins

Blog banner

Constrains in service design

Blog banner

History of Money

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Security Issues

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Question

Blog banner

Objectives and functions of Operating System...

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Cache memory

Blog banner

Web Site

Blog banner

 " Healing of Yoga "

Blog banner

LINUX

Blog banner

Types of Big Data

Blog banner

Memory management

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Process in OS

Blog banner

Deadlock

Blog banner

Deadlock in operating system

Blog banner

Indian Food

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

E-learning in today's world

Blog banner

Be you

Blog banner

Threads in OS

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

RAID

Blog banner

Buffering

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

My Favorite Country

Blog banner

Direct memory access (DMA)

Blog banner

GIS info about Bermuda Triangle

Blog banner

IoT Evolution

Blog banner

Proof-of-Stake (PoS)

Blog banner