More and more businesses are being hacked by remote working flaws

Remote working is here to stay, but the risks remain

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Businesses and employees have benefitted greatly from the introduction of remote andhybrid working, but have also faced major challenges, new research has found.

A report from Fortinet found almost two-thirds of firms (62%) suffered a data breach during the last two to three years, which could be, at least in part, attributed to the remote working environment.

The idea of remote working introducing new risks into the workplace is thus no longer merely theoretical, but also proven in practice. Fortinet says there are vulnerabilities in the way work is being organized that threat actors actively exploit to steal sensitive data. Usually, that data is either sold on the black market, used to mount additional attacks, or used as a bargaining chip in a ransom negotiation.

Training the workforce

Training the workforce

For businesses looking to keep, and advance, their remote working environment, the biggest challenge is training the workforce. Most of these workers aren’t that proficient in cybersecurity and as such present the weakest link in the security chain. To make matters worse, IT teams don’t have full visibility into their organization’s attack surface, due to countlessendpointsconnecting from various locations.

With asset ownership blurry, IT teams struggle to enforce zero trust network access and deploy security patches.

How to work from home: everything you need for remote working>Amazon is fighting some of its employees over the cost of working from home>These are the best firewalls right now

These risks are real, Fortinet concludes, and many organizations still haven’t addressed them fully. However, despite the hardships, remote working is here to stay, the report states. Furthermore, it says that CISOs and security leaders are spending increasing amounts of money on new cybersecurity solutions.

Among the different technologies they have at their disposal, most decision-makers go for network access control tools,antivirusprograms, multi-factor authentication solutions, and cloud security solutions.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Via:VentureBeat

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

This new malware utilizes a rare programming language to evade traditional detection methods

A new form of macOS malware is being used by devious North Korean hackers

Belkin SoundForm Wired Earbuds with USB-C Connector review: sadly, these live up to their nominal price tag