sb-eu logo
Story image

Remote workers need to up their game to keep organisations secure

Habits of individuals in a workplace may be impacting the security of the overall business, according to a new study published by CyberArk that looks at the current state of security in today's expanded remote work environment.

According to the study, employees' habits, including password re-use and letting family members use corporate devices, are putting critical business systems and sensitive data at risk.

Furthermore, the survey found that 60% of remote employees are using unmanaged, insecure BYOD devices to access corporate systems. In addition, 57% of employees have adopted communication and collaboration tools such as Zoom and Microsoft Teams, which have been the focus of highly publicised security flaws.

CyberArk’s study also found that the risks to corporate security become even higher when it comes to working parents.

The company states this group has become responsible for many moving parts, including teaching and caring for children at home while also working, and as such understandably have given convenience precedence over following good cybersecurity practices.

Of this group, 57% insecurely save passwords in browsers on their corporate devices, 89% reuse passwords across applications and devices, and 21% admitted that they allow other members of their household to use their corporate devices for activities like schoolwork, gaming and shopping.

CyberArk posed the question, are current cyber security policies enough? The study found that while 91% of IT Teams are confident in their ability to secure the new remote workforce, more than half (57%) have not increased their security protocols despite the significant change in the way employees connect to corporate systems and the addition of new productivity applications.

The researchers state that the rush to onboard new applications and services that enable remote work, combined with insecure connections and dangerous security practices of employees, has widened the attack surface and security strategies need to be updated to match this new dynamic threat landscape.

This is especially true when it comes to securing privileged credentials of remote workers, which if compromised could open the door to an organisation's critical systems and resources.

CyberArk SVP EMEA Rich Turner says, “Major socio-economic events have always led to a sharp uptake in cyber incidents. The WHO has warned of an exponential increase in attacks due to the global and unprecedented nature of the ongoing health crisis, and its transformative impact on the way we work.

“With the accelerated use of collaboration tools and home networks for professional purposes, best-practice security is struggling to keep pace with the need for convenience which, in turn, is leaving businesses vulnerable.”

Turner states, responsibility for security needs to be split between employees and employers. For employees, this means constantly updating and never re-using passwords, verifying that the operating system and application software they use are up to date, and ensuring all work and communication is conducted only on approved devices, applications and collaboration tools.

Simultaneously, businesses must constantly review their security policies to ensure employees only have access to the critical data and systems they need to do their work, and no more. Decreasing exposure is critical in the context of an expanded attack surface.

The CyberArk Remote Work survey was conducted in late April 2020 by an independent research agency. The study included responses from 300 remote office workers and 300 IT professionals in the United Kingdom.

Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Strong cybersecurity posture crucial for company success - Fortinet
"They should also conduct due diligence to ensure partners aren’t inadvertently creating vulnerabilities with insufficient cybersecurity measures."More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More