How to secure remote work
Cybersecurity and teleworking – the two don’t get along very well since the majority of workers worked from home last year. In 2020, 62% of Americans started working from home; and for 49% this was their first remote working experience. This meant that suddenly many more employees were using their personal devices rather than company-issued devices. They worked over unsecured or spotty WIFI and left security holes. Employees suddenly started using zoom and other video and collaboration tools to do business; Tools that were easy to hack. The ability to secure remote work is key.
In addition, employees were suddenly connecting to their corporate networks in droves, making the networks vulnerable as they were not supposed to handle the bulk of remote connections. Not to mention, while 75% of employees typically follow the security protocols prescribed by their employers, only 20% have actually received posts on cybersecurity at home.
Add all that together and you get a 300 percent increase in cyberattacks, according to the FBI. Attacks on remote workers are also increasing fivefold, and 20% of all organizations report an increase in security breaches. Not to mention, phishing has increased by 600% and ransomware has increased by 148%. The 2020 pandemic brought more than just a virus with it. With the increase in remote working, it is expected that 76% of organizations will take longer than before to identify and contain security breaches. 70% of organizations say the cost of a security breach will only increase. Cyber criminals will continue to target remote workers with social engineering attacks, hack compromised and IoT devices, and break through unsecured WiFi networks.
Is multi-factor authentication the answer?
It’s time for the internet to hit your plate. Multi-factor authentication just isn’t enough. Passwords are too easy to hack and security questions are too easy to guess from reading a user’s social media. The real answer to these new security challenges lies in passwordless authentication. This replaces passwords with cryptography and biometrics. It’s also risk-based, which means that every user and device signal is checked. There is also no need to use out-of-band messages that can be intercepted.
It’s 2021. We’re doing things differently now and it’s time for cybersecurity to start the program.