Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Working from Home Isn’t Without Significant Cybersecurity Risks

Working from Home Isn’t Without Significant Cybersecurity Risks

The COVID-19 pandemic has greatly disrupted daily life, restricting people to their homes and preventing them from going into the office to work. In response, many companies are hurriedly changing over to a remote-capable workforce and having their employees work from home. This strategy can be highly effective, but if a company and its team isn’t careful, it can also be risky.

Why This Matters Now

Many businesses have had no choice but to shut down as “non-essential” businesses are closed. While the definition of an “essential” business varies from place to place, the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency have provided some general guidelines describing what kind of services should be seen as essential.

This list includes many businesses who could conceivably operate on a remote basis, if they had the internal capabilities. Unfortunately, this often isn’t the most secure option. Let’s review why working from home can be less secure than working in the office, and what you can do to help minimize these effects.

Security Threats for Remote Workers

As you would expect, there are a lot of factors that can serve as a detriment to remote work’s inherent security. This is exacerbated by the fact that there is currently a global health disaster that cybercriminals can use to their advantage:

  • The security implemented into the business’ network is no longer protecting the employees and their devices.
  • Employees may have more lax security habits when not in the workplace.
  • Cybercriminals can shape their attacks and scams to be more convincing in the current climate.
  • Many businesses haven’t prepared for this eventuality, and so are lacking the remote strategies that would keep their employees secure.

Therefore, cybercriminals have the opportunity to use many of their favorite tactics to their advantage. Researchers and cybersecurity professionals have seen an uptick in ransomware attacks, remote access tools, and trojans, thanks to cybercriminals using COVID-19 as bait during their phishing attacks by playing off the stress that the coronavirus is causing in many people. It doesn’t help that many remote workers will check their personal emails alongside their professional ones, adding to the chances of a successful attack via their email. Others will pose as the hiring organization itself to swindle remote employees.

To be fair, attackers are also seeing more success in targeting businesses directly, while security is put on the back burner as they focus on their COVID-19 preparedness.

As we mentioned earlier, businesses are also generally ill-prepared for this kind of event, especially those who operate in industries that aren’t commonly associated with remote operations, and whose systems are often outdated and poorly maintained, and/or proprietary in nature and not conducive to remote capabilities. Industries that face particular regulations and certification requirements have another hurdle to clear.

What Can Be Done?

While it is unfortunately going to be a reactive response at this point instead of a proactive measure, businesses can adopt certain solutions that will assist them in securing their remote workers from attack.

  • Cloud Solutions - Utilizing the cloud, rather than requiring users to remote into an at-work solution, can prevent an external access point from being created that leads into your network. Simpler to use than remote access and inherently secure, a cloud solution is ideal for remote working. With the opportunity to host software, store data, or some combination of the two, the cloud can enable many of your employees to work completely independently of your network.

  • Company Issued Eequipment - With a company-issued device, it becomes a lot easier to ensure that your team has the security solutions and updates you need them to have. While this will require some investment into mobile devices that support your needs, this is a measure with lasting influence on your overall security and productivity.

  • Employee Training and Education - Finally, and perhaps most importantly, your employees need to understand that their responsibility for the cybersecurity of the company at large carries over as they are working remotely. Teaching them how crucial security updates are, how to spot phishing attacks, and other preventative measures will make a huge difference.

While the COVID-19 pandemic may be providing businesses with the motivation to put these measures into place now, these measures and other recommended best practices should always be followed. 415 IT can help you put them into place whether you’re an essential business or not. Give us a call at (415) 295-4898 to learn more. 

VoIP is a Great Tool for Remote Work
Tip of the Week: Remote Productivity Tips


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Efficiency Software Internet Email Managed IT Services Outsourced IT Malware Innovation Business Tech Term Small Business Upgrade Hackers Cloud Computing Windows 10 Cybersecurity Microsoft User Tips Collaboration Business Management Computer Hardware Phishing Business Continuity Google Mobile Devices Communication VoIp Workplace Tips Managed Service Ransomware Android Managed Service Provider Paperless Office Smartphones Backup Server Office 365 Quick Tips Communications Encryption Mobile Device Remote Monitoring Data Management Managed IT Disaster Recovery Network Browser Internet of Things Passwords Holiday BDR Artificial Intelligence Wi-Fi Business Technology Vulnerability Windows 7 Saving Money Healthcare Managed IT services Compliance Remote Work Smartphone Miscellaneous Laptops Help Desk Document Management Government Save Money Social Media Facebook Applications Blockchain Virtualization Microsoft Office Employer-Employee Relationship Information Processor Tip of the week Data Security Vendor Management Project Management Health Avoiding Downtime Two-factor Authentication Bandwidth Redundancy Antivirus Scam Users Automation Access Control Website Infrastructure Virtual Private Network Software as a Service Windows Company Culture RMM Mobility Chrome IoT Proactive Meetings IT Management Analytics Data Loss Customer Relationship Management Maintenance Router Storage VPN BYOD OneDrive Machine Learning Cooperation Managed Services Provider Risk Management Files Remote Workers Apps Recycling Net Neutrality Unified Threat Management Social Network Password Tablet Covid-19 Internet Exlporer Dark Web Word Augmented Reality Server Management Smart Technology Patch Management Regulations Computing Monitoring Management File Management File Sharing Hard Drive Gadgets Payment Cards Co-Managed IT Financial Assessment Remote Monitoring and Management Alert Operating System Mobile Security Network Management Flexibility Office Bring Your Own Device Electronic Health Records HIPAA Utility Computing Consultation Unified Communications Employees Consulting Downtime Professional Services Training Managed Services Employee-Employer Relationship Networking Time Management Search Gmail The Internet of Things Heating/Cooling Black Friday Mobile Device Management Smart Tech Virtual Assistant Bitcoin Biometric Shortcut Proactive IT Customer Service Mobile Manufacturing Vendor Mouse Language Wireless Development GDPR Trending IT Assessment Money Favorites Batteries Asset Tracking Backup and Disaster Recovery Motherboard Chromebook Wireless Internet Big Data Statistics Credit Cards Break Fix Lenovo Read Only IT Technicians Security Cameras Cost Management Transportation Active Directory Budget Servers Cyber Monday Staff Samsung Point of Sale Tech Terms Connectivity Wasting Time Current Events Gamification Permissions MSP IT Consulting Finance Smart Devices Computing Infrastructure SharePoint Cookies Cables Digitize Microsoft Excel Conferencing Migration eWaste CIO applications Mail Merge User Error Human Error Vulnerabilities Employer/Employee Relationships Apple Bluetooth Computers Superfish Printing Windows Server Recovery Hard Disk Drives Sensors Windows Server 2008 E-Commerce Theft Database Mobile Office Google Calendar Fraud Data Breach Authentication Managing Stress Alerts Downloads Electronic Medical Records Nanotechnology Wires Notes Shadow IT Chatbots Travel Address OneNote WiFi Permission Mobile Computing Proactive Maintenance Solid State Drive Holidays Virtual Reality Mirgation Remote Worker User Management Solid State Drives Websites Firewall Features Wearable Technology Star Wars Voice over Internet Protocol Projects Outsource IT Authorization Spam Enterprise Content Management Comparison Licensing App PowerPoint Display Outsourcing Techology Politics Identity Theft Enterprise Resource Planning Value of Managed Services Technology Tips How To Test Geography Cybercrime Cyber security IT Data Warehousing Private Cloud Cache Teamwork Information Technology Social Networking Options Telephone SaaS Optimization Distributed Denial of Service Procurement Return on Investment Laptop Legislation WPA3 Technology Laws Specifications Emergency Multi-Factor Security Screen Reader Video Conferencing Outlook Disaster Resistance Instant Messaging Identity Digital Payment Hotspot Printer Modem High-Speed Internet Database Management Touchscreen Hacking Business Telephone Operations Bookmarks Remote Computing ROI Shared resources Going Green Unified Threat Management Zero-Day Threat G Suite 5G Mobile VoIP Virtual Machines Managed IT Service Cyberattacks Tech Support Social Settings Personal Information Remote Working Fleet Tracking Printers Twitter Education Marketing CEO Students Daniel Stevens Regulation

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...