Get your daily dose of tech!

We Shape Your Knowledge

Smart working: many advantages, but pay attention to data security

Kirey Group

  

    In 2020 talking about corporate IT security means considering much more aspects

    The digital transformation is increasingly expanding the working perimeter, moving the boundaries of the company even within the home.

    In particular, for reasons of social and health prevention, in recent days many companies are asking their employees to apply the "smart working", the possibility of working at home remotely. Fundamental for this kind of agile work is to allow employees full access to business data: you can use VPN (Software that allow employees to access the network of their company) activated in a short time; or to data sharing platforms (such as Office 365, Google Drive or Dropbox).

    The advantages are innumerable, but the control over the protective structures is considerably reduced. In fact, mobile devices for remote work are among the main attack vectors: about 40% of the companies that has suffered this type of attack has recorded important exploits and losses: the average business cost is about 1,400,000 euros for a security incident involving data loss through mobile devices. (Source: cybersecurity360). In addition, employees who use their mobile devices for remote work (but also for personal use) lead to a potential increase in the risk of cyber security breach.

    To address all these issues proactively and not be found unprepared for evolving threats, companies should take an approach that combines training and protection: it is important to make use of both regular training on the importance of computer security for the staff, and of customized security solutions based on the needs of the company.

    Related posts:

    Network & Security Assurance: how to face netw...

    Kirey Group and IP Fabric aims to integrate network assurance capabilities to create a complete and ...

    Kirey Group at the Clusit Security Summit in colla...

    Kirey Group participates to the Clusit Security Summit, the event dedicated to the security of infor...

    Code in the washing machine!

    The SAST process should always be included in the context of the S-SDLC to correctly validate the co...