30/05/2018
In today's evolving professional landscape, remote work has transitioned from a niche perk to a widespread norm for many organisations. This shift, while offering flexibility and potentially increased productivity, also raises pertinent questions about cybersecurity. Are businesses operating with a distributed workforce at a greater risk of cyberattacks? How can companies and their employees better fortify their defences in this remote context? This article delves into expert advice to navigate the cybersecurity challenges of working from home.

Remote Work: Not Inherently Risky
The very act of connecting remotely and utilising company equipment from home might initially seem like a significant risk factor. However, Guillaume Clément, an associate at KPMG specialising in cybersecurity services, offers a nuanced perspective. According to Clément, when the appropriate security measures are in place, remote work is just as secure as working from the office. The heightened risk, he explains, stems more from the circumstances under which remote work was rapidly implemented, particularly during the pandemic. "In a cloud-based world, it's increasingly less true that remote work poses a problem. However, in the urgency of the pandemic, certain security mechanisms may not have been perfectly implemented everywhere. Access had to be granted to all employees overnight. It is this context, above all, that has generated a potential weakness," Clément states.
The Power of Two-Factor Authentication
While businesses are increasingly fostering a culture of security, continuous employee awareness remains one of the most potent defences against cyberattacks. Guillaume Clément highlights that consistently approaching received content with a degree of skepticism is a sound practice. He also emphasises that advanced protection methods are now becoming standard. "In 2023, when working remotely, it's not normal to be able to connect to a remote network or a cloud service with just a single password. Multi-factor authentication systems are the norm today," he asserts.
What is Multi-Factor Authentication (MFA)?
Multi-factor authentication (MFA) is a security process that requires users to provide two or more verification factors to gain access to a resource, such as an application, online account, or VPN. It goes beyond just a username and password, adding layers of security. These factors typically fall into three categories:
- Something you know: This is typically a password or a PIN.
- Something you have: This could be a physical token, a smartphone with an authenticator app, or a security key.
- Something you are: This refers to biometric data, such as a fingerprint or facial scan.
By requiring a combination of these factors, MFA significantly reduces the risk of unauthorised access, even if one of the factors (like a password) is compromised.
Many classic cyberattack techniques are designed to trick humans rather than exploit system vulnerabilities. Phishing scams or impersonation attempts, where attackers pose as managers to obtain confidential information, are not new strategies. However, Guillaume Clément explains that the risk associated with these schemes can be amplified when employees are working in isolation. "When working from home, communication between colleagues is less direct. You can't just turn to another member of your team to verify the origin of a suspicious communication. You have to write to them or call them. This can become an additional opportunity for cyber attackers," he notes.
Understanding these tactics is crucial for defence:
- Phishing: Emails or messages that appear to be from legitimate sources, aiming to trick recipients into revealing sensitive information or clicking malicious links.
- Spear Phishing: A more targeted form of phishing, often personalised to a specific individual or organisation.
- Pretexting: Creating a fabricated scenario or pretext to gain trust and solicit information. For example, pretending to be from IT support to request login credentials.
- Baiting: Offering something enticing (like a free download or a USB drive) that is infected with malware.
Best Practices for IT Security
Certain straightforward strategies, while seemingly obvious, form the primary line of defence in cybersecurity. The KPMG specialist reiterates the paramount importance of keeping software and workstations updated. "Many attackers look for easy exploits, particularly outdated security software. A next-generation antivirus is essential for your defence strategy," he advises. He also stresses the importance of maintaining external backups that are not connected to your network to prevent malicious actors from accessing or encrypting them.
Key Security Practices for Remote Workers
Here's a summary of essential practices:
| Practice | Description | Importance |
|---|---|---|
| Software Updates | Regularly update operating systems, applications, and antivirus software. | Closes known vulnerabilities exploited by attackers. |
| Strong Passwords & MFA | Use complex, unique passwords and enable multi-factor authentication wherever possible. | Prevents unauthorised access even if credentials are compromised. |
| Be Wary of Communications | Scrutinise emails, messages, and links. Verify suspicious requests through separate communication channels. | Mitigates social engineering and phishing attacks. |
| Secure Network Usage | Avoid public Wi-Fi for sensitive work. Use a VPN (Virtual Private Network) for secure connections. | Protects data from interception on unsecured networks. |
| Data Backups | Regularly back up important data to an external, offline location. | Ensures data recovery in case of ransomware or data loss. |
Are Small and Medium-sized Enterprises (SMEs) More at Risk?
The answer to this question is nuanced. Generally, attackers are opportunistic, and SMEs often have fewer security resources compared to larger corporations. However, proportionally speaking, it can be easier for a small business to achieve a strong security posture than for a large, complex enterprise. Hackers seek out minor vulnerabilities, and complex organisations present a wider array of potential entry points. Guillaume Clément points out that SMEs are not necessarily less attractive targets, but with reasonable investment and focus, they can effectively protect themselves.
Large enterprises, with their vast networks, numerous employees, and extensive data, present a more attractive and complex target for sophisticated attacks. However, they also typically possess more significant budgets and dedicated security teams. SMEs, on the other hand, might be perceived as easier targets due to limited resources, but their simpler infrastructure can sometimes be more manageable to secure effectively. The key for SMEs lies in prioritising essential security measures and adopting a proactive stance.
Frequently Asked Questions (FAQs)
- Q1: Is my home Wi-Fi secure enough for remote work?
- A1: While home Wi-Fi can be secure, it's crucial to ensure it uses strong encryption (WPA2 or WPA3), has a unique and complex password, and that the router's firmware is up-to-date. For highly sensitive work, using a company-provided VPN is highly recommended.
- Q2: What should I do if I suspect a phishing attempt?
- A2: Do not click on any links or download any attachments. Report the suspicious email to your IT department or security team immediately. If you've accidentally provided information, inform your IT department right away.
- Q3: How often should I back up my data?
- A3: The frequency of backups depends on how often your data changes. For critical data, daily backups are often recommended. Ensure your backups are stored securely and separately from your main network.
- Q4: Can my employer monitor my activity when I work from home?
- A4: Depending on company policy and the software installed on company devices, employers may monitor activity. It's important to be aware of your company's policies regarding remote work and data privacy.
- Q5: What is the most critical cybersecurity measure for remote employees?
- A5: While many measures are important, maintaining vigilance against social engineering tactics (like phishing) and ensuring the use of strong, unique passwords coupled with multi-factor authentication are arguably the most critical day-to-day defences.
Conclusion
The rise of remote work necessitates a heightened focus on cybersecurity. While the shift presents new challenges, particularly regarding the isolation of employees and the potential for rapid, less-than-perfect security implementations, these risks are manageable. By adhering to best practices, such as implementing multi-factor authentication, staying vigilant against phishing attempts, keeping software updated, and maintaining secure data backup protocols, businesses and their employees can create a robust defence. The key is not to view remote work as inherently insecure, but to proactively implement and maintain strong cyber hygiene to protect against evolving threats.
If you want to read more articles similar to Remote Work Cybersecurity: Staying Safe, you can visit the Automotive category.
