Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Do You Know Which Remote Users Contribute the Biggest Risks?

Do You Know Which Remote Users Contribute the Biggest Risks?

With so many people working from home right now, businesses have managed to keep their operations going somewhat successfully by using the remote solutions that are available today. While it is fortunate that today’s technology enables businesses to do so, the importance of cybersecurity cannot be understated as remote work is implemented.

Of course, many business owners may anticipate that certain users would contribute a greater level of risk than others. Let’s examine a few trends to see if this expectation holds any water.

The State of Personal Cybersecurity

Let’s consider something so that we can properly frame the rest of our discussion: while you may have established cybersecurity standards in your office that your employees are required to comply with, they may not follow these standards when it comes to their personal computing.

This could potentially lead to issues if remote work is exercised as an option. After all, if operating outside of the protections you’ve established on your network, your users could potentially let in a threat that could then see whatever data or resources your team member has access to. Therefore, it is important that you know what standards your employees hold in terms of their own devices and connections.

A survey released by the National Cyber Security Alliance has revealed a variety of helpful insights pertaining to remote work, so far as personal security standards are concerned. Surveying 1000 American adults, half aged between 18 to 34 years old and half from 50 to 75, a few crucial differences between the behaviors of these two cohorts were identified.

What the Survey Revealed

Somewhat predictably, the younger age group tended to show superior security practices in a few of their responses. 89 percent of the 18-to-34 bracket were likely to utilize two-factor authentication, while 70 percent of the 50-to-75 users did. In 18-to-34, 83 percent checked their software updates regularly, while 63 percent of 50-to-75 users do.

However, looking at the data in a more macro sense, security practices were still inconsistent in both groups, albeit in different ways. While more of the younger crowd would choose to implement two-factor authentication, relatively few of them would update their antivirus and firewall solutions as diligently as they should and greater numbers of them would connect to public Wi-Fi. The data also showed the older survey respondents as being more careful about their data security, and that—despite being primarily made up of the 18-to-34 age bracket—most remote workers were not taking the recommended additional steps needed to reinforce their security.

So, in a way, this survey simply revealed that everyone is lacking in their security practices as they work remotely. It just manifests differently in the 18-to-34 age bracket than it does in the 50-to-75.

What Does This Mean for Your Security Right Now?

The answer to this is simple: you can’t—despite any preconceptions about your users—assume that one age group will be naturally more secure than the other when working, whether in-house or remotely. Therefore, there are a few steps that you need to take so that you can be sure that your team is aware and alert.

First, your team needs to be up to speed on the behaviors that you expect them to follow in and out of the office. This means you need to provide them with different training materials and exercises to help them practice these skills, regularly evaluating your entire team’s shared performance and attending to individuals as need be.

Direct Technology Group is here to help you better lock down your team’s cybersecurity, regardless of where they’re working from. Give us a call at 954-739-4700 to find out more about the solutions and services we have to offer.

Tip of the Week: Maintaining a Work/Life Balance, ...
New Smartphones with New (or Older) Shapes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 27 November 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Google Hackers Network Security Microsoft Data Malware Smartphones User Tips Business Software Workplace Tips Innovation Miscellaneous Hardware Email IT Support Communication Mobile Devices Hosted Solutions Backup communications Internet Computer Small Business Android Smartphone Cybersecurity Ransomware Users VoIP Productivity Business Management Network Upgrade Outsourced IT Social Media Mobile Device Windows Collaboration Browser Windows 10 Managed IT Services Passwords Tech Term IT Services Microsoft Office Save Money Holiday Employer-Employee Relationship Cloud Computing Managed Service Apps Windows 10 Automation Bandwidth Business Continuity Phishing Managed IT Services Facebook Gadgets Quick Tips Office Covid-19 Marketing Data Backup Internet of Things Chrome Saving Money IT Support Mobile Device Management Disaster Recovery Wireless Data Recovery Networking Wi-Fi Information Apple Server Health Gmail Router Office 365 Alert Analytics Applications Password Remote Cybercrime Retail VPN Managed Service Provider Computers Access Control Data Breach App Hacking Virtualization Office Tips Business Intelligence Mobility Remote Computing Settings Government Law Enforcement iPhone WiFi BYOD Application Remote Monitoring Battery Remote Work Recovery Excel Patch Management Going Green Blockchain Website Twitter Operating System Laptop BDR Physical Security Data Management Mobile Computing Spam VoIP Mobile Office Paperless Office Information Technology Telephone Systems Politics Employee-Employer Relationship Biometrics Managed IT Service Compliance Entertainment History Mouse Artificial Intelligence Big Data End of Support Voice over Internet Protocol Virus Bring Your Own Device Value Social Engineering Environment Conferencing Maintenance Printer Word Google Drive Lithium-ion battery Humor Workers Safety Managing Stress Cost Management Sports RAM Net Neutrality Human Resources Business Technology Cleaning Processor Meetings Vulnerability Scam DDoS YouTube Healthcare Robot Company Culture Hard Drives Cortana Tech Support IT solutions Telephony Smart Technology Data Security Customer Relationship Management G Suite Shadow IT Files Risk Management Customer Service Medical IT Internet Exlporer Data storage Connectivity Streaming Media Fax Server The Internet of Things Current Events Batteries SharePoint Social Network Search Telephone System Encryption Two-factor Authentication PowerPoint Hosted Solution Wireless Charging Dark Web Education Payment Cards eWaste Tip of the week Content Filtering User Error Virtual Assistant Data Protection Best Practice Windows 7 Virtual Reality HIPAA Hybrid Cloud Training Printer Server How To Tech Terms Remote Monitoring and Management Tablet Shortcut Relocation National Security People Backup and Disaster Recovery Authentication Bloatware Telecommuting Internet Explorer Windows XP Email Management PDF Project Management Running Cable Security Cameras Virtual Private Network Hard Drive Network Attached Storage Analysis User Security Video Games Uninterrupted Power Supply Chrome OS Remote Workers Updates SSD Authorization Entrepreneur Millennials Threat Licensing Insurance Wearables Co-Managed IT Social Networking Processors Microsoft Teams Server Management Tablets Gadget Black Market Inventory Troubleshooting Phone System Printing Webcam Travel Memes User Spyware Machine Learning Worker Alerts Electronic Health Records Management Display Mobile Security Update File Management Paper Live Streaming Distributed Denial of Service NarrowBand IT HP Telecommute Reporting Memory Sales Work/Life Balance Downtime Employees Remote Working Budget Benchmarks e-waste Outlook Managed Services Provider Voice over IP Ink Avoiding Downtime Multi-Factor Security Automobile WhatsApp Wireless Technology E-Commerce Hosted Desktop Bluetooth Document Management Cables Data loss Knowledge Solid State Drive Recycling Profitability Vendor Programming eCommerce News Chromecast Payment Firewall USB Digital Staff GDPR Access Comparison disposal Copy Monitor Hard Disk Drive PCI DSS Internet exploMicrosoft Eliminating Downtime Online Shopping Downloads Antivirus Techology instant Messaging Profiles Edge Websites Storage Analyitcs Printers Specifications Paste Reputation Video Regulations Compliance Advertising Bitcoin Wireless Internet Distribution Consultant Trends Computer Accessories Google Maps Hacker HaaS Notifications Vulnerabilities Computer Repair Amazon Dongle Error Spotify Customer OneNote Innovations Private Cloud Help Desk Fleet Management Best Available Lead Generation A.I. Cameras Science Personal Information Remote Support Flexibility Hiring/Firing Cryptocurrency IT Service IT budget Plug-In Touchscreen Database Cabling Remote Control Windows Server 2008 R2 Tip of the Week/Security Public Cloud Threats Certification Multi-Factor Authentication Movies Botnet Windows 8 SaaS Legal Staffing Touchpad Mobile IT Management Proactive IT Taskbar Reviews Technology Tips Microsoft Office 365 WIndows 7 User Tip Tactics Unified Threat Management Spam Blocking Scams Wearable Technology Holidays Social WannaCry Unified Communications Managed IT File Sharing Windows Media Player Time Management