Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 31 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New Research Highlights Increased Security Risks Posed by Remote Working and BYOD

“The State of Remote Work” report shows that 32% of remote workers use apps or software for work that are not approved by IT; organisations are more vulnerable as the attack surface has left the building.

by Guru Writer
May 2, 2023
in Cloud Security, Data Protection, Featured, News
New Research Highlights Increased Security Risks Posed by Remote Working and BYOD
Share on FacebookShare on Twitter

New research released by  Lookout, Inc. the increased number of growing threats associated with remote work and bring your own device (BYOD) policies faced by organisations. The State of Remote Work Security aims to help raise awareness amongst IT and security leaders about the growing threats associated with remote work and bring your own device (BYOD) policies. Survey results show that with remote and hybrid working, personal and work tasks blur together and the boundaries between the two have become more porous. Lookout data shows that 32% of remote and hybrid workers use apps or software not approved by IT and 92% of remote employees perform work tasks on their personal tablet or smartphone devices. These devices, apps and software, along with the corporate data being accessed, are not visible to IT, thereby dramatically increasing an organization’s risk posture. The report was released today on the first-ever Lookout World Cloud Security Day.

The modern office no longer exists within the traditional security perimeter

The cloud has become a crucial backbone for most organisations. In 2020, 61% of businesses in the U.S. migrated their workloads to the cloud – triggered by the global pandemic and the need to quickly support remote work. While providing employees with remote access to corporate data in the cloud provides flexibility and potential boosts to productivity, this coupled with BYOD can also increase an organisation’s exposure to risk. Because these devices are most likely not managed by IT, organisations have little visibility or control over potential threats such as operating system and app vulnerabilities, the types of apps that have access to corporate data, as well as phishing attempts. As organisations continue to move their apps to the cloud, IT needs to move beyond providing access to users based on device posture and instead address how they can extend access control policies to ensure secure usage of corporate data stored in these apps.

Remote employees less likely to follow data security best practices

Additional report findings include the following remote worker behaviours that create increased data security risks to organisations:

  • 90% access corporate networks from areas other than their home, with an average of five different locations – this introduces security risks as company data could be exposed across multiple networks not monitored by IT.
  • 46% have saved a work file onto their personal device instead of their employer’s network drive – personal device OSs are far more likely to be out of date which means they are not protected against the latest vulnerability exploits and malware.
  • Nearly one in three remote employees work more than 20 hours per week on their personal tablet or smartphone device – personal devices often have dozens of unsanctioned apps that threat actors use as avenues for their phishing attacks.
  • 45% use the same password for work and personal accounts – reusing passwords exposes a user’s accounts to cybercriminals, which increases the risk of identity theft as well as sensitive data theft from their organization.

All of these behaviours point to the need for organisations to have a completely new approach to security so that it keeps pace with the way remote users access data and collaborate with each other.

“The rise of remote work has led to more opportunities and flexibility for a great deal of people, but unfortunately it has also resulted in a massive expansion of the corporate attack surface,” said Sundaram Lakshmanan, chief technology officer, Lookout. “IT teams don’t have control over the networks from which their employees connect most of the time, which exposes both the users and corporate data to both internal and external threats exponentially. Lookout provides tools that enable organisations to protect their users and devices, along with enforcing adaptive security policies to protect access to data stored in these corporate apps, from both internal and external threats. This is the motivation behind the Lookout World Cloud Security Day – addressing this change is essential for any organisation that has a fully remote or hybrid work environment.”

The State of Remote Work Security report from Lookout is based on a survey of 3,000 remote and hybrid workers from enterprise companies in the United States, United Kingdom, France and Germany.

You can read more Tips for Cybersecurity in Remote Working here.

 

 

FacebookTweetLinkedIn
ShareTweet
Previous Post

For Cybersecurity, the Tricks Come More Than Once a Year

Next Post

Keeper Security and KnowBe4 Sponsor European Cybersecurity Blogger Awards 2023

Recent News

Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023
SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information