Remote & Vulnerable

Representative Image of Cyber Security

Working life has changed as we know it. The pandemic has acted as a catalyst for businesses to adopt a hybrid working model. This has, however, allowed successful cyberattacks to increase as businesses adapt and transition to the new normal. Andrea Babbs, UK General Manager, VIPRE, emphasises the importance for businesses to have complete all-round security, relying on technology augmented by human intervention.

Cybercriminals are using increasingly sophisticated means of targeting both individuals and businesses of all shapes and sizes. Social engineering, ransomware and malware are just some of today’s top IT risks, and that’s without considering any new threats that might be around the corner. According to VIPRE’s whitepaper, email phishing scams and malware attacks accelerated by 20% during the pandemic. Hackers took advantage of vulnerable remote workers who are away from the support of their IT teams, and these numbers show no signs of slowing down – especially with hybrid working now becoming the ‘norm.’

However, the biggest threat of all is the humans themselves, with 85% of data breaches involving a user. And now, the risk is only further heightened as working from home brings new security problems, for example, adding distractions that you may not find in an office environment – leading to mistakes being made, such as sharing private information with the wrong person, or working from a personal and unprotected device.

IT tools are not the be-all and end-all of protection against cyberattacks, especially not by themselves. Humans have skills that technology solutions cannot comprehend. Employees can interpret language differently and take into consideration multiple perspectives, whereas not all technology is mature enough to make these decisions. Although these tools play a significant part in keeping threats out, if companies invest more in their human firewall then the two can join forces, providing 360-degree protection. But how can businesses do this successfully?

The key to creating a safe and agile workforce starts with changing the existing mindset, rather than perceiving security training as a compliance tick box. If all employees are trained to be more alert to the risks they pose and understand the role they have in keeping data safe, businesses can reinforce a “security-first approach.” Businesses need to offer learning that is engaging. By incorporating relevant and real-life scenarios into the security training, the content should resonate with a global audience and reinforce key messages.

As highlighted, human error is one of the main entry points for cyber attackers, but such risks can be mitigated. When sending an email to the incorrect recipient, or attaching the wrong document, technologies can be put in place to alert the employee to double-check their email before clicking send – in turn, helping to prevent these types of inadvertent data breaches without having an impact on employee productivity.

Additionally, visible tools, such as multi-factor authentication, password protection and restricted web browsing can be supported better and used more effectively once the staff are trained. When this final step, an appropriate set of security tools – both those that are visible and invisible to the user – is implemented, with regular user training; then the Next Generation Human Firewall is ‘active’.

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

IoT Security: Protecting Your Connected Devices from Cyber Attacks

Miro Khach • 19th June 2024

Did you know we’re heading towards having more than 25 billion IoT devices by 2030? This jump means we have to really focus on keeping our smart devices safe. We’re looking at everything from threats to our connected home gadgets to needing strong encryption methods. Ensuring we have secure ways to talk to these devices...

Future Proofing Shipping Against the Next Crisis

Captain Steve Bomgardner • 18th June 2024

Irrespective of whether the next crisis for ship owners is war, weather or another global health event, one fact is ineluctable: recruiting onboard crew is becoming difficult. With limited shore time and contracts that become ever longer, morale is a big issue on board. The job can be both mundane and high risk. Every day...

London Tech Week 2024: A Launched Recap

Dianne Castillo • 17th June 2024

Dominating global tech investment, London Tech Week 2024 was buzzing with innovation. Our team joined the action, interviewing founders and soaking up the latest tech trends. Discover key takeaways and meet some of the exciting startups we met!

The Future of Smart Buildings: Trends in Occupancy Monitoring

Khai Zin Thein • 12th June 2024

Occupancy monitoring technology is revolutionising building management with advancements in AI and IoT. AI algorithms analyse data from IoT sensors, enabling automated adjustments in lighting, HVAC, and security systems based on occupancy levels. Modern systems leverage big data and AI to optimise space usage and resource management, reducing energy consumption and promoting sustainability. Enhanced encryption...