Home

/

Blog

/

TeamViewer: cyber security in remote work

TeamViewer: cyber security in remote work

Share

Remote work allows us to be more flexible and helps to avoid CO2 emissions from work-related travel. And since the beginning of the Covid-19 pandemic, remote work has become a common practice valued by employers and officials. No, working remotely represents a cyber security approach for companies, especially when officials take advantage of additional risks. Read our article to learn more about these risks and get a useful checklist of recommended cyber security practices that you can download.

The Covid-19 pandemic has caused a spread of remote work practices throughout the world. And, as companies and their employees learn during this period, working remotely has some important benefits: it allows employees to work with more flexible hours, manage work together with childcare, better environmental impact, and even work at home on a cold day.

The remote work I saw to fix

These benefits include extensive oil from remote work. According to a 2022 McKinsey research, two Americans can work remotely at least once a week and 87% give them the option to do it. Um every three officials can work completely at home. Another interesting result of the study is that, alongside traditionally heavy remote work sectors, such as IT, Finance or Design, a growing number of people in legal, educational or health-related occupations are doing less of their work at home.

Remote work comes with many challenges

O que muitas pessoas não percebem é que, In terms of IT security, managing remote work represents a unique challenge.

A study carried out by HP in 2021 revealed that 76% two desktop employees say they work remotely due to the pandemic confusing the line between work and personal life. More specifically,

  • 50% two officials investigated use their work devices for private purposes
  • 27% we use them to play
  • 36% transmit online content
  • 40% we use them for online education
  • 27% will allow other people to use their work devices.

For IT specialists, this is where the warning signs begin to dream: all these behaviors have consequences that go beyond the balance between professional and personal life of each employee. According to this study, most IT executives associate the use of work devices for purposes not related to work or the sharing of devices with a substantial increase in the risk of security breaches in their company.

Other security challenges in a remote work context may arise due to:

  • Policies Swallow your own device limited skills of two IT technicians to manage and supervise deployed devices and software
  • Officials in geographically dispersed teams that you have fewer opportunities to exchange with your co-workers and may be more vulnerable to blows
  • Users who are not always connected to the company network , we can be tempted to connect to public or unknown Wi-Fi networks, which cybercriminals can use to invade corporate devices

Most companies are not ready for cyber attacks

The above-mentioned behaviors of remote workers (among other factors) contribute to an increase in cybercrime since the start of the Covid-19 pandemic. Accenture estimates that the number of cyber attacks in 2021 will increase by 21% compared to 2020 – for an average of 270 attacks per company over the course of the year.

The problem is that many companies are ill-equipped to defend themselves from these attacks. Positive Technologies estimates that the network perimeter of 93% of companies is penetrable to cybercriminals. Além disso, in accordance with the ISACA State of Cybersecurity 2021, 61% das organizations indicate a lack of people when it comes to cyber security professionals.

On the other hand, organizations are starting to make security a priority. A research carried out in 2022 by Enterprise Strategy Group discovered that 69% of companies will increase their cyber security provision in 2022.

The key to improving an organization's IT security management is to educate its users. Users who know how to detect a potential attack and follow certain recommended cyber security practices contribute greatly to keeping company data safe.

Best practices that your users can (and should!) follow

We develop an exportable checklist of the best cyber security practices, explained in non-technical terms that you can share with your other users:

  • Certify that you are connected to your company's network, Avoid using public Wi-Fi and never connect to an unknown network.
  • Do not click on links or suspicious annexes. If you are not sure, talk to your co-workers or contact your department or IT provider.
  • Suspend calls and messages from numbers you don't know and never share confidential information over the phone.
  • When you find a bump, report it immediately. to your IT department or supplier.
  • Create strong and exclusive signals for all logins. Ask your IT contact about hiring a revenue manager, if he or she is not working. Use 2-factor authentication when possible.
  • Check the URL of the site before entering the login information e distrust when requested to alter your senha.
  • Do not install software or browser plug-ins, unless provided by your organization.
  • Comply with the update policy (correction) of software of your organization.
  • Even at home, make sure you lock the device (for this, press the Windows key but L on Windows, press Cmd + Ctrl + Q on Mac) when not in use. When in transit, never leave your device unattended.
  • Please backup your data regularly using the armature in new parts of your organization.
  • Be careful with the information you publish online. Cybercriminals can use their personal data to harm you and your organization.


SOURCE: TeamViewer Blog

Software.com.br is part of TeamViewer and is also a reference in technology solutions for the corporate world in Latin America. Through partnerships with the main market manufacturers, a company working in Digital Transformation, with specialized consultants in: Software Licensing, Cybersecurity, DevOps, Infrastructure and Data Analytics.

See more about TeamViewer on our site: Software.com.br

Do you need to speak with a specialist?

We're available to answer any questions you may have. Click the button below to contact us.

To share

Products related to the post
Products related to the post

There are no related products.

en_US