News Feed

10 Remote Work Cybersecurity Risks and How to Prevent Them – TechTarget

You forgot to provide an Email Address.
This email address doesn’t appear to be valid.
This email address is already registered. Please log in.
You have exceeded the maximum character limit.
Please provide a Corporate Email Address.
Please check the box if you want to proceed.
Please check the box if you want to proceed.
Despite some mandates for workers to go back to the office in the aftermath of the COVID-19 pandemic, most organizations are sticking with remote work or a hybrid approach. These work-from-anywhere environments might be a boon for employees, but they create headaches for the cybersecurity and IT teams who must contend with the security risks stemming from remote work.
According to a February 2023 survey by Pew Research Center, 35% of workers with jobs that can be done remotely were working from home full time, and 41% had a hybrid schedule combining remote and in-office work. Most CEOs plan to keep such arrangements in place, based on the “C-Suite Outlook 2024: Leading for Tomorrow” report from The Conference Board. Only 4% of the CEOs it surveyed in late 2023, both in the U.S. and worldwide, said they will prioritize a full-time return to the office by workers.
At the same time, the number of cyberattacks against organizations continues to rise. For example, attempted attacks detected by cybersecurity software vendor Armis increased 104% year to year in 2023, it said in a report titled “The Anatomy of Cybersecurity: A Dissection of 2023’s Attack Landscape.” The combination of cloud, on-premises and remote environments complicates efforts to protect IT systems against attacks, Armis said in the report, which was published in January 2024.
Cybersecurity teams have been beefing up their organization’s defenses and adjusting security strategies based on lessons learned after remote work options were widely scaled up during the pandemic’s early days, said Colin Troha, cybersecurity managing director at Boston Consulting Group’s BCG Platinion unit and the firm’s North American leader on cybersecurity.
This article is part of
The new defenses and strategies are designed to counter the security challenges that arose from the expansion of remote work, Troha said. However, many of those challenges remain in play — and new ones have emerged since then. As a result, many teams “still struggle with getting the right protections and the right security mechanisms in place — not only for now, but for the future, too,” he said.
Armis made a similar point in its report, calling out “the ongoing need to balance the security challenges of hybrid work.”
Efforts to do so can be further complicated, though, by cybersecurity staffing issues in organizations. In a 2023 survey conducted by TechTarget’s Enterprise Strategy Group and Information Systems Security Association International, a combined 71% of the 301 ISSA members who responded said their organization was being somewhat or significantly affected by the ongoing shortage of skilled cybersecurity professionals.
Working remotely, or mixing that and in-office work, can raise the risk of data breaches and different types of cyberattacks for various reasons, according to Troha and other security experts. Here are 10 of the most prominent cybersecurity risks associated with remote work and the work-from-anywhere movement.
With more employees working remotely, the attack surface in organizations has become larger. They have more endpoint devices, networking connections and software to secure, all of which greatly increase the workload for security staffs that are often stretched thin, said Kumar Avijit, cloud and infrastructure practice director in the IT services team at research firm Everest Group. “That also adds to the complexity of what [teams] must secure,” he added.
In recent years, many security teams have implemented tools that prevent workers from downloading sensitive information to their local devices, yet data loss due to remote work is still a real problem, Troha said. In fact, he and other consultants said work-from-anywhere environments increase the risk of data breaches and leaks even in organizations with strong data protection policies and procedures. With security teams having less direct oversight of employees outside the office, remote work heightens the chances of both unintentional and malicious exposure or loss of corporate data. For example, workers might have sensitive data on their screens that could be seen by other people — whether family members and visitors at home or strangers passing by at a public location. Also, disgruntled employees leaving for another job can easily snap photos of proprietary data on their screens when working remotely — something they likely wouldn’t do in an office where they might be noticed.
Organizations might find that regulatory compliance is more challenging in work-from-anywhere environments. Remote workers can access and transport data in ways that violate the growing list of data privacy and protection laws, as well as contractual obligations with other organizations, said Scott Reynolds, senior director for enterprise cybersecurity at professional association ISACA. “You may have contracts that say this data may only be processed in the EU or the U.K.,” he said. “But, if you have workers coming to the U.S. or working remotely elsewhere and they start working on that data, that introduces a compliance risk.”
Phishing and other types of social engineering attacks are a threat whether workers are in the office or remote. However, such attacks tend to be more successful when aimed at remote workers, said Sushila Nair, vice president of security services at NTT Data Services and a member of ISACA’s Emerging Trends Working Group. “Research has found that people working from home can be more distracted and they’re more likely to click on suspicious links,” she said. Moreover, remote workers can’t verify that email messages purportedly sent by colleagues are legitimate as easily as they could if working in the same office with others. That increases the chance they fall victim to phishing emails disguised as requests for passwords or data from co-workers and executives, as well as customers, business partners and other reputable organizations.
Attackers now are also using AI — in particular, generative AI tools — to automate social engineering attacks, said Ed Skoudis, president of the SANS Technology Institute, a college that’s part of cybersecurity training, education and certification firm SANS Institute. Remote workers, especially ones who don’t regularly meet in person with others, might have an even harder time distinguishing such attacks from legitimate communications. Without strong working relationships between them and co-workers, for example, they might not detect the increasingly subtle differences in language used by attackers impersonating colleagues with the help of AI tools. In addition, generative AI enables attackers to create and carry out phishing campaigns much faster than they could on their own, increasing the number of attacks that both remote and in-office workers can face.
The combination of increased remote work and longstanding BYOD policies means many people use personal devices to do their jobs, regardless of whether they have the skills to adequately secure and protect their laptops and smartphones, said Jim Wilhelm, principal in the cybersecurity services practice at KPMG. Organizations can require employees to take certain steps, such as changing default passwords, but security leaders don’t always have visibility into whether workers fully comply with such mandates. “CISOs have to hope their workers are following their security policies,” said Steven McKinnon, associate director for financial fraud and investigation on the cyber solutions team at consulting firm Guidehouse.
Remote work also increases the chance that employees use unsecured networks, such as public Wi-Fi. Even home networks are often vulnerable to attacks. “Corporations can secure their own networks, but they can’t know how any network that’s not corporately managed — whether it’s a network in a worker’s house or at their local cafe — is configured,” Reynolds said. “They’re essentially relying on a third party to implement the needed network security.”
The fact that other users tend to be on public Wi-Fi and home networks further expands cybersecurity risks, Troha said. If someone else’s device is poorly secured, an attacker could use it as a conduit into the network and then ultimately into a remote worker’s device, too.
Early in the pandemic, attackers exploited the increased use of video conferencing and online collaboration platforms without strong security controls. Cybercriminals sabotaged remote meetings and online conferences and prowled around undetected on Zoom and other platforms to obtain information to use to their advantage. Skoudis said the risk of such incidents still exists, although it has been mitigated by the defensive measures that security teams rushed into place in response to those incidents.
More commonly now than trying to infiltrate meetings, attackers are targeting chat platforms used by employees. “They’re getting into an organization’s chat, where they’ll watch and monitor for months to see how people are interacting,” Skoudis said. “Then, they’ll build relationships, build trust and gather information.” Remote workers who only or mostly engage with colleagues through the chat function tend to be less likely to detect an attacker’s subterfuge, he added.
The following security management best practices can drastically reduce an organization’s chances of suffering a costly — and sometimes devastating — cyberattack that takes advantage of weaknesses and vulnerabilities in remote work environments:
Mary K. Pratt is an award-winning freelance journalist with a focus on covering enterprise IT and cybersecurity management.
Cybersecurity budget breakdown and best practices
Benefits of outsourcing your cybersecurity operations
Cybersecurity governance: A path to cyber maturity
Free cybersecurity tools you should know about
Key cybersecurity metrics and KPIs for businesses to track
The cloud’s effect on application management and licensing is expected to shift from end-user applications to SDN concepts. Say …
Black holes in the network disrupt connectivity and compromise data integrity. Network monitoring, team collaboration and routing…
The open source LFTP client supports multiple file transport types, such as FTP and HTTPS, enabling administrators to use a …
Cybersecurity and cloud top the list of 2024’s tech investment drivers, according to an Enterprise Strategy Group survey. But …
Lifelike experiences and new business opportunities are among the potential benefits of the still-developing metaverse. Drawbacks…
While the United Nations’ artificial intelligence resolution does not create legally binding rules, it might indicate which …
There are several ways that IT administrators and users can change the name of Intune-managed Windows devices, but first they …
Local admin accounts can cause problems for Windows administrators due to their lack of oversight and privileged account status. …
The Intune enrollment process can follow several paths, but one of the most common and efficient approaches involves Windows …
Do you want to enhance automation, consistency, scalability and cost-effectiveness? Follow this step-by-step tutorial on how to …
For decades, pundits have suggested that IBM has lost relevance. IBM wasn’t in trouble then, and it’s not in trouble now. See how…
Establishing sound multi-cloud governance practices can mitigate challenges and enforce security. Review best practices and tools…
Provider of artificial intelligence-driven cloud solutions expands global footprint and drives adoption momentum of contact …
Despite a previous pledge that HMRC’s IR35 online status checker tool will be continually updated as employment cases and …
Analysis from Google has found that zero-day vulnerabilities are much more heavily exploited for espionage purposes than for …
All Rights Reserved, Copyright 2000 – 2024, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information


This article was autogenerated from a news feed from CDO TIMES selected high quality news and research sources. There was no editorial review conducted beyond that by CDO TIMES staff. Need help with any of the topics in our articles? Schedule your free CDO TIMES Tech Navigator call today to stay ahead of the curve and gain insider advantages to propel your business!

Leave a Reply