The road to permanent remote working

person working from home
How can we protect our data when so many are working from home? (Image credit: Shutterstock)

The transition into permanent remote working is inescapable now. Countless articles, morning talk shows and widely-shared social media polls have all indicated this irreversible trajectory. 

There is simply no recourse to ‘un-ring that bell’. What may have started off as a necessity to adhere to social distancing regulations is progressively becoming a preference, a lifestyle choice and the norm for swathes of the workforce. 

Large corporations, from Facebook and Google to Capital One and Paypal, have broadened their work-from-home options and so too have small and medium sized enterprises: 43% of UK SMEs shifted into remote working within a week of lockdown measures being implemented in Britain. Moreover, nine in 10 employees wish to continue this arrangement post-lockdown. SME owners are likely to concede too, with 57% already considering remote working options in the long term.

Across the globe, employees and employers alike are recognizing the possible benefits that this new working environment offers. Chief among these, is the substantial reduction in costs. 

Businesses no longer have to spend a stupefying amount on office rent, and employees can swap cramped and overpriced flats in the city for affordable housing elsewhere. Long gone are wasted hours spent on long commutes, and for the most part, we are working a lot more productively. It is by and large a win-win situation for both parties.

The challenges of cybersecurity

Employees do not adhere to the security protocols simply due to a lack of knowledge of the threats

As with any novel undertaking, however, a new set of challenges are beginning to present themselves. In this case, these challenges center greatly on cybersecurity. With the switch to remote working, a number of risks have emerged. 

For instance, one common mistake businesses make is leaving personal devices unsecured. Understandably, most cannot afford to provide each of their employees a corporate device decked out with the latest security software. Rather, they are required to trust that their employees abide by the same security protocols as they would in the office. Unfortunately, evidence has shown this to be a risky move, with home office networks being 3.5 times more likely than corporate networks to be infected by malware.

Often, employees do not adhere to the security protocols simply due to a lack of knowledge of the threats, which failure to comply can leave them vulnerable to. The move to remote working was so necessarily abrupt that many businesses did not have the time to implement clear policies and procedures, leaving employees to improvise. 

This creates a ‘perfect storm’ scenario for cybercriminals. We have already seen a recent ramp up in malicious activity: VMWare’s ‘Global Threat Report’ discovered that 91% of global respondents saw an increase in cyberattacks as a result of employees working from home.

From duping employees through phishing emails purporting to offer the latest coronavirus update to exploiting overburdened VPNs, bad actors are keeping a keen eye on our vulnerabilities to leverage these for their personal gain. So, what are some simple steps that businesses can take to improve their security posture?

Setting cyber hygiene standards

cyber security graphic

It's near impossible to correct harmful behaviors if people don't know what is or isn't harmful (Image credit: Pixabay)

First and foremost, businesses need to set out a clear and easy-to-follow list of policies, as it is near impossible to correct harmful behaviors if people do not know what is or is not harmful in the first place. Alongside this, a company-wide culture of open communication needs to be fostered whereby employees can freely ask questions, and raise concerns or highlight suspicious activity to their security team.

Next is through meeting basic cyber hygiene standards. This includes ensuring all employees have installed an antivirus software, that they frequently update and patch their devices and employ network firewalls

Most importantly, employees should be taught to use complex passwords. Moreover, these should not be reused across accounts and a policy should be put in place to have these passwords changed on a regular basis. The easiest way to support employees with this is through having them adopt a password manager.

Reducing the threat of cyberattacks

Finally, businesses and employees working on home networks remotely would do well to secure their Wi-Fi access points by changing the default settings and passwords on a router to reduce the possibility of an attack from connected devices.

All of these security measures are laid out by the UK government in the Cyber Essentials scheme, which according to research by the University of Lancaster, has been found to mitigate 98.5% of cybersecurity risks. By following the process, businesses not only improve on their cyber readiness but can receive certification to demonstrate this to potential associates and customers as well.

Small businesses typically lack the budget, expertise and resources to deal with cybersecurity on a good day. Now, many are compelled to do so whilst navigating an unprecedentedly tough economic climate, the ever-changing guidance issued around the pandemic and a rapidly expanding threat landscape. 

While these steps may seem straightforward on paper, they can become quickly time-consuming and overwhelming. As such, small businesses should endeavor to find an understanding and compatible technology partner who can efficiently guide them through their journey to becoming cyber secure.

TOPICS
Jamie Akhtar

Jamie Akhtar is founding CEO of CyberSmart (cybersmart.co.uk), UK leader in simple and accessible automated cybersecurity technology for SMEs. He has built over 100 web applications and served as CTO of several organizations.

Read more
A woman using a laptop to work from home.
Supporting business resiliency for all working policies
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
Cyber-security
Cyber security on a shoestring: maximizing your ROI
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An abstract image of digital security.
Tackling the UK's cybersecurity skills shortage
Security
Protect your network with an AI-secure browser and SASE framework
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Super Mario Odyssey
ChatGPT is the ultimate gaming tool - here's 4 ways you can use AI to help with your next playthrough
Brad Pitt looks over his right shoulder with 'F1' written behind him
Apple Original Films will take you behind-the-scenes of a racing cockpit in this new thrilling F1 movie trailer
AI writer
Coding AI tells developer to write it himself
Reacher looking down at another character from the Prime Video TV series Reacher
Reacher season 3 becomes Prime Video’s biggest returning show thanks to Hollywood’s biggest heavyweight
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Image showing detail of the Leica D-Lux 8
Still can't get a Fujifilm X100VI? This premium Leica compact costs less, and it's in stock