Logo Header Menu

Will an increase in remote working lead to more cyber attacks?

Security expert predicts at least a 30-40% increase in cyber attacks during the coronavirus pandemic as remote working increases Will an increase in remote working lead to more cyber attacks? image

Remote working cyber attacks

The vulnerability of endpoints, from mobile phones and laptops through to home computers will be exploited by cyber attackers to gain access to corporate networks during enforced coronavirus remote working, according to Dave Waterson, CEO at security protection software company, SentryBay.

He predicts that cyber attacks exploiting endpoints will rise by at least 30-40%.

Speaking as hundreds of thousands of employees start to work from home as the coronavirus spreads, Waterson urges companies to quickly ensure that they don’t allow unprotected devices to open the door to cyber criminals.

“Already malicious actors are targeting people with phishing emails, and there is much worse to come,” he commented.

“Endpoints are notoriously vulnerable, with as many as 42% being unprotected at any given time. With so many people using compromised laptops or home computers to log-in to the corporate network, they are creating a weak link in the security chain, and potentially devastating damage to their employer at what is already a very testing time.”

Waterson is anticipating that because over two thirds of security breaches already originate at the endpoint, the huge rise in remote working is likely to lead to a sharp increase in cyber-attacks as a result of this vulnerability.

“Not only are people moving on to unmanaged devices and home computers outside the corporate perimeter, which may only have inadequate anti-virus software protection, but they could also access the corporate network from tablets or phones without realising they have no protection,” he said.

“Most enterprises have little or no control over what software is running, or has previously been executed on these devices, and limited mechanisms for checking and addressing these deficiencies.”

SentryBay’s advice to organisations is to use security solutions that are specifically designed to protect data entry on Bring-Your-Own-Device and unmanaged devices, particularly into remote access apps like Citrix, VMWare, WVD, web browsers and Microsoft Office applications. Browsers that access the corporate network should be locked down, including URL whitelisting, enforced certificate checking and enforced https.

A remote working guide: how can UK businesses prepare for an Italy-style Covid-19 lockdown?

In the event of an Italy-style Covid-19 lockdown, UK businesses need a remote working guide to prepare them for potential disruption to their day-to-day. Read here

Remote working: defend the email

Companies all across the UK are sending their workers home, and so the need to protect these workers, their devices and corporate networks is paramount.

Beyond Encryption, for example, a Hampshire-based cyber security firm, has followed in the footsteps of Silicon Valley by trialling a remote working policy in the wake of Covid-19.

With the fears surrounding the Coronavirus outbreak worsening by the day, businesses are already relying on technology for remote working.

According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more and specialist video conferencing businesses have seen a near doubling in share value, when the rest of the market is shrinking.

Reliance upon email communications will increase significantly but basic email security has remained unchanged for 30 years. Many smaller businesses are still likely to be using outdated Simple Mail Transfer Protocol (SMTP) when sending or receiving email. As such, the default state of all email services is unencrypted, unsecure and open to attack — putting crucial information at risk.

Ensuring external email communications are protected and not susceptible to interception and abuse will be increasingly important.

Paul Holland, CEO of Beyond Encryption said: “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority.

“We decided to road test our own remote working policy to ensure that we truly practice what we preach, that our meetings and conversations were unhindered, and, indeed arguably, we operated more efficiently!

“Many other companies, large and small, are already trialling their remote working policies, from those in Silicon Valley to us here at Beyond Encryption. As well as protecting our health by working from home, it’s important that we also protect our communications and data,” added Holland.

We support technology leaders and businesses that utilise technology solutions with useful guides and advice. With remote working becoming the de facto due to the recent outbreak of coronavirus, our content can help smooth this transition for your business. Submit your details here to receive regular updates on this and more direct to your inbox.

Sign up for Information Age Newsletters

Latest news

divider
Releases & Updates
Morrisons ruled not liable for employee data leak by Supreme Court

Morrisons ruled not liable for employee data leak by Supreme Court

1 April 2020 / The leak of Morrisons payroll data was found to have been the fault of Andrew [...]

divider
Business Skills
Coronavirus Diary: experiencing minimal disruption despite lockdown

Coronavirus Diary: experiencing minimal disruption despite lockdown

1 April 2020 / In the coming months, Information Age will release a Coronavirus Diary post every week, focusing [...]

divider
Data Analytics & Data Science
Why data science is allowing for optimism in the midst of the coronavirus

Why data science is allowing for optimism in the midst of the coronavirus

1 April 2020 / This is an unprecedented time. In these unchartered waters, good information, good data and the [...]

divider
Insight Guides
How to motivate a remote workforce: from Zoom to virtual care packages

How to motivate a remote workforce: from Zoom to virtual care packages

1 April 2020 / In an interview with Information Age, Ellen Petry Leanse, chief people officer at Lucidworks, discusses how [...]

divider
Releases & Updates
Canonical launches Managed Apps to simplify cloud operations

Canonical launches Managed Apps to simplify cloud operations

1 April 2020 / Companies will now be able to have their apps deployed and operated using the Managed [...]

divider
DevOps
Build or buy: DataOps in a time of technological transformation

Build or buy: DataOps in a time of technological transformation

1 April 2020 / The pace of technology innovation is accelerating at an almost exponential rate, making business transformation [...]

divider
Data Storage & Data Lakes
Waste no time and backup your systems this World Backup Day

Waste no time and backup your systems this World Backup Day

31 March 2020 / World Backup Day is the annual event reminding us how important it is to back [...]

divider
Financial Services
How to build consumer trust in UK FinTech innovations

How to build consumer trust in UK FinTech innovations

31 March 2020 / Maslow’s hierarchy of needs dictates that after a person’s physiological needs are met, they prioritise [...]

divider
Releases & Updates
Blue Prism and SailPoint partner to deliver new governance capabilities

Blue Prism and SailPoint partner to deliver new governance capabilities

31 March 2020 / The partnership between Blue Prism and SailPoint has been established in an aim to deliver [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest