Love it or hate it, Working From Home is huge and here to stay.
As a nation, we’ve really embraced the changes forced upon us by the pandemic. Many businesses have become more flexible with a mixture of office-based workers, hybrid workers, and fully remote workers. We had no idea that we could change so much, so quickly, did we? Work just doesn’t look the same as it did in 2019.
And because of that, cyber security in 2022 doesn’t look the same either. When you have people working away from your office you need to take additional security measures to keep your data safe.
Even before we’d heard the word “Coronavirus”, many of us were working from home now and
then. Checking emails at the weekend. Finishing up a project in the evening. Getting a head start on your week.
Now Working From Home has to be taken more seriously. If any of your staff works anywhere away from the office, there’s a chance they’re taking unnecessary risks with your data.
Many businesses seem to have this covered. They’ve invested in new company devices, increased remote security, and have trained their people on best practice.
But there’s something important some businesses haven’t considered.
We mean devices used to access business data that the company doesn’t know about.
Your company laptop and mobile are likely to be safe because they’ve been set up properly with managed security.
But what about other devices your team use for work? John’s “other” laptop; the one he grabs sometimes in the evenings just to do his email.
In fact, the risk is bigger than this. There’s a risk from virtually all other devices on your team’s home networks.
Their games consoles, other laptops, tablets, and phones. Most people have an entire household of gadgets connected to the network.
And almost all of them are at risk of being accessed by cyber criminals.
The bad guys will find a way
The big thing we know about cyber criminals is that they’re very persistent. If they want in, they will keep going till they find a way. And sometimes, your team will make it too easy for them.
All a hacker needs to do is access one device on someone’s home network. Let’s say it’s a games console. Once they access the console it’s a waiting game. The hacker will be patient and watch the traffic on the network.
It’s possible they’ll be able to learn enough from that to eventually spot a security hole with a work device.
Often, by the time someone’s noticed something’s wrong, it’s too late. The hacker may have gained access to the VPN – the Virtual Private Network that allows you to securely connect to the business’s data.
And that means they can potentially gain access to your business’s valuable data. They might make a copy and sell it on the dark web.
Or they might install malware, malicious software that can do damage and corrupt data.
Or the very worst case scenario is they launch a ransomware attack, where your data is encrypted and useless to you, unless you pay a huge ransom fee.
This is the scariest thing that can happen to your business’s data. You do not want to risk this.
The answer isn’t straightforward. Unless your business wants to take
on the security responsibility of all of your staff’s home networks, and all of their devices too.
It’s just not realistic.
However, there are things you can do to lower your risk of an intruder getting into your business network via an
unsecured home network. And it all comes down to a layered approach to security.
There are five things we recommend.
Are you completely fed up with chronic computer problems and escalating IT costs? Do you worry that your backups and IT security are lacking? Do you have a sneaking suspicion that your current IT guy doesn’t have a handle on things?
Then book a free IT Strategy call to discuss your concerns by clicking below. Once you click “Book My Strategy Call” you will be taken to another page to answer a few questions and to schedule a time.