Kaspersky insight: Companies can’t let monitoring software force remote workers off the grid

Workplace surveillance grew tremendously with the addition of remote work. Kaspersky research uncovered that, during the pandemic, 44% of the UK’s home workers had been monitored through software installed on corporate devices. This same research also found that a quarter of home-workers are now using ‘shadow IT’, personal devices and software, to avoid workplace surveillance.

Pre-empting the potentially disastrous threats associated with this, Chris Hurst, Managing Director of Kaspersky UK&I, argues that employers need to better communicate with the staff around surveillance and build trust in the security needs requiring monitoring software.

How can employees be trusted, and supported, when they’re not in physical sight? It’s a question that has plagued bosses and decision-makers for years now, potentially also delaying the widespread rollout of remote working. In fact, before 2020, it was reported that 80% of organisations were still yet to implement a remote working programme. All that has changed during a subsequent year where businesses have been left with no option but to place their trust in a dispersed workforce. But to what extent has this new dynamic been forced, and what is that employee trust based on?

Over the past year, since the onset of COVID-19, 44% of the UK’s pandemic-forced home working contingent have had monitoring software installed on company-provided devices as a way for bosses to ensure accountability when not in the office. Almost a quarter (24%) of that same group has subsequently admitted to using their own devices to avoid such surveillance during the period.

Already, that notion of ‘trust’ is a fine line. And after a settling-in period, businesses must now re-evaluate their monitoring levels to avoid a longer-term breakdown of trust that might lead to increased use of devices not protected by the corporate infrastructure. In essence, shadow IT can’t be the cost of surveillance.

Forced into hiding

At first glance, all seems right with this new world. A study of 2,000 full-time workers in the UK – across both management and employee levels – has found that the relationship between bosses and workers remains strong despite the upheaval and drastic change levels for some. In fact, almost two-thirds (64%) of employees and employers confirm this trust from one to the other.

This comes from an initial understanding that the pay-off for greater work-life flexibility may indeed be device surveillance, and it’s equally understandable that the extent of such monitoring would rise in tandem with the past year’s transition. But given that this monitoring now transcends emails, internet and app usage, phone use, and even location tracking, businesses must also keep in mind the ramifications of overstepping the mark and forcing their staff into hiding.

Switching between corporate and personal devices for each of their intended uses is one thing, but findings show that 31% of UK workers would likely use a personal device more for work purposes if an employer was monitoring them. Put simply, the more invasive the monitoring becomes, the less receptive employees become to the idea of being watched at all.

Walking the tightrope

To begin with, employees veering towards shadow IT may have been out of ease or convenience, not to have to keep switching between personal and business use. But there does also seem to be a genuine aversion to the idea of being monitored to such a broad extent – a prospect epitomised by respondents feeling less productive (24%) or less creative (25%) as a result of surveillance software being used.

More worryingly, nearly a quarter (24%) of workers would likely leave their job if they felt their privacy was being invaded, leaving employers in a tricky position and potentially walking a tightrope of trust. It’s a tightrope businesses can’t afford to fall off either. On the one hand, given the speed in which the past year’s events have unfolded, allowing complete independence among the homeworking contingent, with no account of work patterns, productivity levels, or task stats, would be to lose critical insight in some cases – control. On the other hand, if workers go into hiding and begin to use personal devices to avoid any such accountability, security becomes even more concerned.

The latter scenario of shadow IT opens the door to cybersecurity vulnerabilities at their most pressured moment. The threat of attacks has massively increased due to the remote working transition, as opportunists have capitalised on network transformations and – most aptly – employee error. And that’s why organisations must strike the appropriate balance between accountability and invasion in their surveillance efforts.

The need for an open dialogue

More than a third of respondents believe that the monitoring of employees has increased within their company since the start of the COVID-19 pandemic. And despite the initial strong levels of trust being voiced, we’re already seeing that workers are not far away from slipping into bad habits as this trend increases – especially if they feel the pendulum swinging too sternly towards ‘spying’, rather than ‘monitoring’.

This shows that it’s a fine balance that businesses must address soon. The remote working dynamic looks set to stay long beyond any impacts of the pandemic, and open dialogue needs to be formed to establish a level of surveillance that workers deem acceptable in the long term. However, this negotiation needs to occur while also affirming that escaping to personal devices to carry out work projects is never a safe response.

READ MORE:

By having this conversation now, and finding this sweet spot between surveillance and shadow IT, the positive relationship that exists following the most challenging of years can still certainly be maintained. And businesses’ newly liberated workers can continue to thrive without becoming a cybersecurity danger.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...