wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SECURITY RISKS OF REMOTE WORKING

profile
Khadija Shaikh
Jul 08, 2022
0 Likes
0 Discussions
104 Reads

Thanks to major advancements in technology, the modern workforce is no longer tied to a single location and is able to work from virtually anywhere in the world. This remote work revolution has changed lives, enabling employees to develop a healthier work/life balance and put their best foot forward, while employers enjoy the cost savings of not having to pay for physical office space and the ability to hire from a much larger talent pool. In light of COVID-19, remote work has taken on even greater significance, enabling businesses to weather economic uncertainty and workers to keep their jobs without having to put their health on the line. It’s safe to say that remote work arrangements aren’t going away any time soon — quite the opposite, in fact. That means that organizations need to figure out how to maintain security when employees work remotely.
Even under the best of circumstances, remote work can present certain security challenges.
o    Unsecured Wi-Fi networks: Accessing corporate data and systems from poorly secured public or home Wi-Fi networks could open up a corporate network to unauthorized access.
o    Bring your own device: The increasingly common practice of using personal devices such as laptops or smartphones for work creates a proliferation of devices that may not adhere to corporate security protocols.
o    Human factors: Human nature presents one of the largest security risks. Employees who lack an understanding of security risks may be susceptible to cyber attacks such as phishing scams. Or, distracted employees could unknowingly expose their login credentials in a public space.
o    Lack of training: A lack of remote work security awareness and training. Employees who are not trained in security best practices are more likely to use weak passwords and expose their company to risks in other ways.
o    Decreased visibility: When employees work in remote locations, the IT staff lacks visibility into the endpoints employees are using and potentially risky user behaviour.


Comments ()


Sign in

Read Next

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Blockchain uses and use cases

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Child labour

Blog banner

The seven-step improvement process

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Types of Hackers.

Blog banner

Network Forensics

Blog banner

Zero-Day Attack

Blog banner

Social engineering in cyber security

Blog banner

What is Internet

Blog banner

Disk scheduling

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

IP Address

Blog banner

Virtual Memory

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Deadlock

Blog banner

URL vs Domain

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Record Blocking

Blog banner

Strengthening Active Directory Security

Blog banner

Deadlocks

Blog banner

Process, process creation and process termination

Blog banner

Social Media.

Blog banner

Race Condition in Operating Theatre

Blog banner

"Audit" In Data Science

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Review on Recovering Deleted Files

Blog banner

Dekkers Algorithm

Blog banner

Defining youtubr

Blog banner

Importance Of Yoga.

Blog banner

MACHINE LEARNING

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Dudhasagar waterfall ?

Blog banner

A little bit of salt is all the hash needs!

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

All you need to know about “On-page SEO”

Blog banner

Memory management

Blog banner