Can we really ask long-term home workers to stay vigilant to cyber threats?

By delving into remote work and an increase in cybercrime, Mark Wilson, Chief Marketing officer at BlackBerry, discusses the responsibility fallen on employes to remain cyber vigilant. He also offers a fitting solution as hybrid working persists for many.
By delving into remote work and an increase in cybercrime, Mark Wilson, Chief Marketing officer at BlackBerry, discusses the responsibility fallen on employes to remain cyber vigilant. He also offers a fitting solution as hybrid working persists for many.

Throughout the pandemic, we’ve all been told that working from home (WFH) increases the chance of cyber-attacks. Now, as more and more multinational organisations publicly commit to ‘work from anywhere’ policies long-term, it seems that this heightened threat is here to stay.

Many organisations have implemented policies and shared advice to help home workers stay safe, but amid busy working days, sometimes combined with home schooling and often with longer working hours than usual, our patience with complex safety procedures was always destined to wear thin quickly.

The cyber threat to organisations is real and active but, critically, the seemingly unlikely chance of a devastating attack means it’s not a priority for the average home worker. As threat actors increase their arsenal of techniques, organisations must ask themselves: can employees really remain vigilant to this threat forever more?

Home workers really are at greater risk than ever

A new survey from AT&T found 55% of employees report being targeted by cyber-attacks while working remotely. Yet, despite the shocking frequency of such threats to company intellectual property, customer data and our own personal information, 35% of those surveyed connect their work devices to smart home devices. Popular connected home devices include voice assistants (14%), smart speakers (14%), fitness monitors (13%), smart lighting (12%), and smart kitchen appliances (12%). Connecting to these devices dramatically increases the risk of an attack, since their endpoint security is likely to be lax when compared with the closely monitored systems of the traditional office.

Critically, the AT&T report also found that one in five employees (20%) claimed they cannot be encouraged to care about the risk of cyber-attacks. This is wholly understandable; many procedures recommended to employees in the past have been clunky and time-wasting. When a client is asking for a report in a matter of minutes, cybersecurity is the least of an employee’s worries.

Cybersecurity teams should pay attention to these stats. Of all those in the company who are at risk of cyber-attack, those relying on endpoint technologies are the most vulnerable. And yet, 20% of them are unwilling to engage with the messages of caution and vigilance shared by those employed to protect the company. Of course, it takes just one insecure endpoint to allow a cyber-attacker into the system, from where they can start to wreak havoc.

So, how can an organisation hope to secure its employees, technologies and endpoints remotely, without collaborating with employees? 

Zero Trust takes the weight off employees’ shoulders

There is a two-fold method for successfully solving the problem of securing a remote workforce. Devices and technology can be reliably protected by taking a Zero Trust approach to accessing organisational resources. Likewise, employees can be protected through active measures that continuously assess their security risks, but remain out of their view. This non-intrusive form of personalised employee cybersecurity is possible through recent advancements in artificial intelligence (AI), and is called Zero Trust. 

The idea behind Zero Trust is simple – anything wishing to interact with organisational resources must first acquire a certain level of trust. By default, everything starts with a trust score of zero. As interactions occur between the business infrastructure and another actor, trust levels may increase or decrease. The amount of access an actor is granted changes in real-time, along with their trust rating.

Make security pain-free through a Zero Touch approach

While the problem of personal technology connecting to workplace devices is solved with Zero Trust, the vulnerabilities caused by human nature must still be addressed. How does one create a secure environment when workers prioritise productivity over good security practices? How can the 20% of workers apathetic towards additional security measures be protected without their active cooperation? The answer is through implementing a Zero Touch approach to cybersecurity.

Zero Touch, as the name implies, seeks to give users immediate access to their productive assets without taking multiple intermediary steps. Workers who can do their jobs without entering passwords, experiencing timeouts, requesting special permissions, or multiple authentications are less likely to seek shortcuts or workarounds. When no additional security tasks exist for the user to perform, it does not matter if 20% of employees ignore new security measures.

The Zero Touch approach goes hand-in-hand with Zero Trust. Users establish trusted routines and interactions with workplace infrastructure. While performing trusted tasks, they experience no interference from cybersecurity related processes. When unusual activity occurs, trust must be gained or re-established with the system though minimally intrusive verification. The end result: organisational infrastructure is continuously secured while employee productivity continues without interruption.

Work has changed, and so must our approach to cybersecurity

The risks caused by home working during the pandemic have been greater than security analysts predicted. These latest statistics from AT&T should prompt us all to change our approach to cybersecurity to fit into the modern working landscape. Cyber teams should start thinking beyond the standard EDR solutions and instead consider extended detection and response.

READ MORE:

Sure, securing endpoints remains critical, but in the new, connected workplace it’s time to set a new standard that allows employees to gain seamless protection through holistic solutions. This means deploying network telemetry, behavioural analysis and continuous authentication now, to protect the bright new future of work.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...

Nova: The Ultimate AI-Powered Martech Solution for Boosting Sales, Marketing...

Erin Lanahan • 19th November 2024

Discover how Nova, the AI-powered engine behind Launched, revolutionises Martech by automating sales and marketing tasks, enhancing personalisation, and delivering unmatched ROI. With advanced intent data integration, revenue attribution, and real-time insights, Nova empowers businesses to scale, streamline operations, and outperform competitors like 6Sense and 11x.ai. Experience the future of Martech with Nova’s transformative AI...

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...