Hybrid employees continue to be a huge security concern

Published December 8, 2022
Author: Ash Khan

Hybrid employees continue to be a huge security concern

Published December 8, 2022
Author: Ash Khan

According to the research, hybrid employees are still dealing with fraudulent emails.

With the majority of company owners finding, it more difficult to guard against cyber threats than before the pandemic, hybrid workers have been blamed for cybersecurity issues during website security audit once again.

cybersecurity website claims employees are the “primary source” of security problems that can be easily thwarted. The employees working in the hybrid environment still face email security issues due to receiving links and attachments in phishing emails.

Avoidable occurrences

The online security website reports that more than half of respondents (54%) have had their employees engage with harmful material provided via not so secure email, making it the most prevalent facilitator of cyberattacks. Some other cybersecurity statistics include:

64% of public-sector businesses discovered preventable security issues as a result of this method. Furthermore, 71% of business owners believe that the arrival of hybrid workers has made it more difficult to guard against risks following the pandemic.

Around half (50%) is security misconfiguration, which includes things like weaker passwords or employees simply neglecting to safeguard critical data with any kind of credentials.

Tanium also claims that if these companies had the correct assets, things would be much better. The third most prevalent preventable occurrence (47%) is a lack of a secure website checker that is capable of preventing cyberattacks. Some businesses fail to implement even the most basic cybersecurity technologies. Only 19% of businesses utilize web vulnerability assessment tools, 17% employ penetration testing software, and 11% have used packet sniffers for at least five years.

Email Security and hybrid working

Attackers frequently take advantage of unfavorable occurrences. This has not changed during the covid-19 pandemic. This has provided an ideal chance to capitalize on people’s fear, curiosity, worry, or susceptibility. Moving to remote offices was a novel circumstance that we had never seen before, and it had an immediate impact on individuals; many felt anxious, overwhelmed, or even lonely.

It’s no surprise that phishing schemes are on the rise. Not shortly after the epidemic began to spread, reports revealed a 667% spike in phishing emails

Most firms will attempt to defend themselves in the future by investing more in threat detection and endpoint security. Next year, over half (49%) will focus on threat detection, while only slightly less (46%) will focus on endpoint security. Finally, data recovery and backup technologies are the third-highest areas of projected investment (45%).

Technology defending against cybersecurity during Hybrid Working

  1. Email filtering systems may filter inbound and outgoing email traffic as well as scan messages for phishing, spam, malware, adult, bulk, virus, imposter, suspicious links, and other threats.
  1. MFA is an electronic authentication system that allows users to access accounts only after providing two or more pieces of proof that they control these accounts.
  1. Endpoint security allows you to defend computer networks that are connected to your main network remotely.
  1. By enabling encryption on computers, you may safeguard the data stored on the devices by converting it to an unreadable format.
  1. Anti-virus software may identify and remove known viruses, as well as prevent an attack. It is vital to note that more sophisticated threats are being developed, and anti-virus software may not detect them.
  1. A password manager is a digital vault that saves passwords and login credentials. It allows users to generate secure passwords and use them automatically when accessing applications.
  1. Check that all essential data is safe and that you have backups in case of an event.
  1. You can securely and quickly manage who has access to your company’s resources using centralized access governance.
  1. Give your staff secure communication tools like Teams, Slack, and Dropbox. These solutions are more secure than emailing critical documents and information to coworkers. People can also collaborate in real-time using these technologies.