{"id":46374,"date":"2021-09-10T12:15:53","date_gmt":"2021-09-10T06:45:53","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=46374"},"modified":"2021-09-10T12:15:53","modified_gmt":"2021-09-10T06:45:53","slug":"how-the-wfh-movement-has-affected-the-cybersecurity-of-businesses","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/how-the-wfh-movement-has-affected-the-cybersecurity-of-businesses\/","title":{"rendered":"How The WFH Movement has Affected The Cybersecurity of Businesses"},"content":{"rendered":"<p>The whole world\u2019s desk workers were forced to log in <a href=\"https:\/\/www.the-next-tech.com\/future\/9-new-technologies-set-to-revolutionize-working-from-home\/\">remotely<\/a> for well over a year. And even though many people are able to return to their offices and commence life as normal &#8211; depending on where you live, of course &#8211; it\u2019s turned into somewhat of a permanent fixture.<\/p>\n<p>Companies everywhere have realized that the output they need is still delivered without putting bums on seats. This has led to the decision for many businesses to allow their employees the chance to continue working from home if they wish to, at least until the world returns entirely to normal.<\/p>\n<p>Employees are generally happier, they have more time to spend with their families, and there are no more long commutes or fighting through rush hour traffic.<\/p>\n<p>It\u2019s fair to say that plenty of businesses were already prepared for this, whether they had existing work from home policies in place or not. Protecting sensitive company data is important, so a beefed-up <a href=\"https:\/\/www.the-next-tech.com\/security\/how-to-educate-employees-about-cybersecurity\/\">cybersecurity framework<\/a> has long been essential.<br \/>\n<!-- Home page 728x90 --><br \/>\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\"><\/ins> <script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p>However, not all employees will understand the ways that they can jeopardize their company\u2019s network, or just how simple it can be to let hackers in. Increased reliance on technology makes us even more vulnerable to cyber attacks anyway, but staff working from home only serves to make this more likely.<\/p>\n<p>Keep reading to learn just how vulnerable the WFH movement makes the cybersecurity of organizations the world over and check <a href=\"https:\/\/www.perimeter81.com\/glossary\/wfh\" target=\"_blank\" rel=\"noopener\">this article<\/a> about WFH only.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/entertainment\/how-to-create-a-second-youtube-channel\/\">How To Create A Second YouTube Channel? Steps To Create Multiple YouTube Channel + FAQs<\/a><\/span>\n<h3>\u00a0The Risk Of Phishing Emails<\/h3>\n<p><strong>\u00a0<\/strong>For anyone that\u2019s unaware of phishing schemes, the term simply refers to an engineered form of communication that\u2019s designed to spoof the receiver into handing over account access to steal sensitive data.<\/p>\n<p>Phishing is a real problem, even for those that are aware of it, because the fake correspondence is often so sophisticated in its design that anyone caught dropping their guard could fall foul of it.<\/p>\n<p>Though they\u2019re often targeted at people\u2019s banking companies or social media accounts, if a hacker were able to gain access to your work email, they could quickly steal both company data and that belonging to your customers.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/top-10\/top-10-programming-languages-for-kids-to-learn\/\">Top 10 Programming Languages for Kids to learn<\/a><\/span>\n<h3>Weak Or Repeat Passwords<\/h3>\n<p><strong>\u00a0<\/strong>A hacker has a much easier chance of guessing your password than they do at bypassing an elaborate cybersecurity network. Think about it, why bother trying to get around firewalls and <a href=\"https:\/\/www.the-next-tech.com\/security\/best-vpns-for-canada-in-2021\/\">VPNs<\/a> when you can simply guess the most commonly used passwords out there?<\/p>\n<p>Some hackers will create code that cycles through a huge list of the most common passwords to continuously try and hack your account. Plus, if you\u2019re using an old password or the same one for such a long period of time, there\u2019s always the chance that someone could be aware of it.<\/p>\n<p>Not routinely changing your password and ensuring that they\u2019re complex enough could cause problems for your company when working from home.<\/p>\n<h3>\u00a0Public Wi-Fi Zones<\/h3>\n<p><strong>\u00a0<\/strong>Your own home <a href=\"https:\/\/www.the-next-tech.com\/future\/the-future-of-wi-fi-trends-that-could-shape-the-future-of-india\/\">Wi-Fi<\/a> is likely not all that safe to begin with, so think about ways that public Wi-Fi can leave your company\u2019s network <a href=\"https:\/\/www.the-next-tech.com\/top-10\/10-strategies-to-help-you-secure-your-digital-life\/\">unprotected<\/a>. Whether you\u2019re at a cafe, on a train, at the airport, or staying at a hotel, the sensitive data you\u2019re transmitting is wide open to hackers. And it\u2019s not hard for them to see who\u2019s connected to it, either.<\/p>\n<p>They need only position themselves between your device and connection in order to distribute malware that can infect your company\u2019s entire network. Sending confidential files and accessing shared networks should be out of the question unless you can vouch for your device\u2019s protection.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/top-10\/7-best-woocommerce-plugins-to-boost-your-store-you-must-know\/\">7 Best Woocommerce Plugins to boost your Store you must know<\/a><\/span>\n<h3>\u00a0Insecure, Personal Devices<\/h3>\n<p><strong>\u00a0<\/strong>Companies that can afford to will likely give devices to their employees that come pre-loaded with a suite of cybersecurity tools. Anyone that\u2019s using their own equipment, whether it\u2019s laptops, phones, or desktops, is inadvertently putting the company\u2019s network at risk.<br \/>\n<!-- Home page 728x90 --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\" data-ad-slot=\"3152971286\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p>In all seriousness, people that are asked to use their own devices likely aren\u2019t armed with the knowledge of what\u2019s needed to safeguard company data and shouldn\u2019t be the ones to blame here.<\/p>\n<p>If this is a requirement of employees, a business should at least be doing its part. That means making sure these devices have the latest VPN, firewall, and other types of encryption necessary to responsibly connect to shared drives.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The whole world\u2019s desk workers were forced to log in remotely for well over a year. And even though many<\/p>\n","protected":false},"author":146,"featured_media":46375,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[1368,600,7374,7375,7376,2471,2347,5298],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/46374"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/146"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=46374"}],"version-history":[{"count":2,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/46374\/revisions"}],"predecessor-version":[{"id":46377,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/46374\/revisions\/46377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/46375"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=46374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=46374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=46374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}