Can we really ask long-term home workers to stay vigilant to cyber threats?

By delving into remote work and an increase in cybercrime, Mark Wilson, Chief Marketing officer at BlackBerry, discusses the responsibility fallen on employes to remain cyber vigilant. He also offers a fitting solution as hybrid working persists for many.
By delving into remote work and an increase in cybercrime, Mark Wilson, Chief Marketing officer at BlackBerry, discusses the responsibility fallen on employes to remain cyber vigilant. He also offers a fitting solution as hybrid working persists for many.

Throughout the pandemic, we’ve all been told that working from home (WFH) increases the chance of cyber-attacks. Now, as more and more multinational organisations publicly commit to ‘work from anywhere’ policies long-term, it seems that this heightened threat is here to stay.

Many organisations have implemented policies and shared advice to help home workers stay safe, but amid busy working days, sometimes combined with home schooling and often with longer working hours than usual, our patience with complex safety procedures was always destined to wear thin quickly.

The cyber threat to organisations is real and active but, critically, the seemingly unlikely chance of a devastating attack means it’s not a priority for the average home worker. As threat actors increase their arsenal of techniques, organisations must ask themselves: can employees really remain vigilant to this threat forever more?

Home workers really are at greater risk than ever

A new survey from AT&T found 55% of employees report being targeted by cyber-attacks while working remotely. Yet, despite the shocking frequency of such threats to company intellectual property, customer data and our own personal information, 35% of those surveyed connect their work devices to smart home devices. Popular connected home devices include voice assistants (14%), smart speakers (14%), fitness monitors (13%), smart lighting (12%), and smart kitchen appliances (12%). Connecting to these devices dramatically increases the risk of an attack, since their endpoint security is likely to be lax when compared with the closely monitored systems of the traditional office.

Critically, the AT&T report also found that one in five employees (20%) claimed they cannot be encouraged to care about the risk of cyber-attacks. This is wholly understandable; many procedures recommended to employees in the past have been clunky and time-wasting. When a client is asking for a report in a matter of minutes, cybersecurity is the least of an employee’s worries.

Cybersecurity teams should pay attention to these stats. Of all those in the company who are at risk of cyber-attack, those relying on endpoint technologies are the most vulnerable. And yet, 20% of them are unwilling to engage with the messages of caution and vigilance shared by those employed to protect the company. Of course, it takes just one insecure endpoint to allow a cyber-attacker into the system, from where they can start to wreak havoc.

So, how can an organisation hope to secure its employees, technologies and endpoints remotely, without collaborating with employees? 

Zero Trust takes the weight off employees’ shoulders

There is a two-fold method for successfully solving the problem of securing a remote workforce. Devices and technology can be reliably protected by taking a Zero Trust approach to accessing organisational resources. Likewise, employees can be protected through active measures that continuously assess their security risks, but remain out of their view. This non-intrusive form of personalised employee cybersecurity is possible through recent advancements in artificial intelligence (AI), and is called Zero Trust. 

The idea behind Zero Trust is simple – anything wishing to interact with organisational resources must first acquire a certain level of trust. By default, everything starts with a trust score of zero. As interactions occur between the business infrastructure and another actor, trust levels may increase or decrease. The amount of access an actor is granted changes in real-time, along with their trust rating.

Make security pain-free through a Zero Touch approach

While the problem of personal technology connecting to workplace devices is solved with Zero Trust, the vulnerabilities caused by human nature must still be addressed. How does one create a secure environment when workers prioritise productivity over good security practices? How can the 20% of workers apathetic towards additional security measures be protected without their active cooperation? The answer is through implementing a Zero Touch approach to cybersecurity.

Zero Touch, as the name implies, seeks to give users immediate access to their productive assets without taking multiple intermediary steps. Workers who can do their jobs without entering passwords, experiencing timeouts, requesting special permissions, or multiple authentications are less likely to seek shortcuts or workarounds. When no additional security tasks exist for the user to perform, it does not matter if 20% of employees ignore new security measures.

The Zero Touch approach goes hand-in-hand with Zero Trust. Users establish trusted routines and interactions with workplace infrastructure. While performing trusted tasks, they experience no interference from cybersecurity related processes. When unusual activity occurs, trust must be gained or re-established with the system though minimally intrusive verification. The end result: organisational infrastructure is continuously secured while employee productivity continues without interruption.

Work has changed, and so must our approach to cybersecurity

The risks caused by home working during the pandemic have been greater than security analysts predicted. These latest statistics from AT&T should prompt us all to change our approach to cybersecurity to fit into the modern working landscape. Cyber teams should start thinking beyond the standard EDR solutions and instead consider extended detection and response.

READ MORE:

Sure, securing endpoints remains critical, but in the new, connected workplace it’s time to set a new standard that allows employees to gain seamless protection through holistic solutions. This means deploying network telemetry, behavioural analysis and continuous authentication now, to protect the bright new future of work.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...

Custom Software Development

Natalia Yanchii • 03rd October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 03rd October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing.
The Digital Transformation Expo is coming to London on October 2-3. Register now!