working remaote and keeping your security practices up to date

With many employees still working remote, security should be a top priority.

Most companies have had transition from office-to-home working over the last several months. Work at home is the norm for many companies and may continue that way. But, are your keeping up with the security of employees outside the office?

It is a bit disturbing when you realize that your employees’ mistakes account for roughly the same number of breaches as external parties who are actively attacking you.” (Verizon’s 2020 Data Breach Investigations Report)

Are your employees ignoring security practices?

Hackers live and thrive on chaos and confusion and the global COVID-19 crisis represents a perfect storm with working remotely.

Adjusting to working remotely may lead to distracts such as children, roommates or not having room for an “office” therefore security practices have slacked.

Tessian, an email security company, reports that 54% of employees say they find workarounds when security policies prevent them from completing tasks.

Also, Tessian report surveyed 2,000 American and British employees, along with 250 IT decision-makers and found 35% of employees take company documents and data with them when they leave a job.

When working from home most employees are using their own device rather than a company issued system. This is listed as one of the top reasons employees aren’t following the standard data security practices per The State of Data Loss Report (Tessian). By using personal devices, they feel they can take additional risks because they aren’t directly being watch by IT and security.

Although some organizations are slowly starting to encourage their employees to migrate back to the office, many have already opted for permanent work-from-home positions.

Security awareness training should continue to be done while employees are working remote.

Corporate Information Technologies provides small to mid-market organizations with expert I.T. services including compliance assessment, cybersecurity penetration tests, and comprehensive business continuity planning services.

Contact us to learn more and let us show you how good I.T. can — Don’t Gamble With Your Security

Comments are closed

Learn More
error: Alert: This Content is protected!