How to Secure Remote Work? Cybersecurity and remote working – so far, the two concepts don’t sit well together, as the majority of workers started working from home last year. In 2020, 62% of Americans started working from home, and for 49% it was their first experience working remotely. This meant that many more employees began using their personal devices rather than company-issued devices. They were working over unsecured or unstable WIFI, which left security vulnerabilities. Employees suddenly began using Zoom and other video and collaboration tools to conduct business; these tools are easy to hack. The ability to secure remote work is key.
Employees also suddenly started connecting to the company’s networks in droves, making the networks vulnerable because they weren’t designed for the mass of remote connections. Not to mention that while 75% of employees typically follow the security protocols provided by their employers, only 20% actually get cybersecurity information at home.
Putting all of this together, the FBI says cyber-attacks increase by 300%. Attacks on remote workers have increased fivefold, and 20% of all businesses reported an increase in security breaches. Not to mention, phishing is up 600% and ransomware is up 148%. The 2020 pandemic brought with it more than just one virus. Because of the increase in remote work, 76% of organizations are expected to take longer than before to detect and contain leaks. 70% of companies say the cost of security breaches will only increase. Cybercriminals will continue to attack remote workers with social engineering attacks, hacking into vulnerable and IOT devices and infiltrating through unsecured WiFi networks.
Is multifactor authentication the answer?
It’s time for the Internet to step up. Multifactor authentication simply isn’t doing the job. Passwords are too easy to crack, and security issues are too easy to guess by examining a user’s social networks. The real answer to these new security challenges lies in passwordless authentication. It replaces passwords with cryptography and biometrics. It is also risk-based, which means that every user and device is checked. It also does not require the use of out-of-band messages that can be intercepted.
This is the year 2021. We’re doing things differently now, and it’s time for cybersecurity to embrace this program.