Educating remote workers on cybersecurity

Issue 2 2021 Cyber Security

Cybercriminals have shifted their focus to vulnerable employees who now work from home and use personal Internet connections. Business leaders need to educate remote workers on cybersecurity and better computer safety practices or risk having their data compromised.

John Mc Loughlin.

In a recent study by Microsoft, more than 25% of remote workers had personally experienced a cyberattack. This is largely as a result of employers being forced to quickly implement a remote work strategy and still not having the necessary security, privacy and workplace procedures in place to secure this new environment more than a year after hard lockdowns and work from home orders started around the world.

While most businesses can invest in more robust data protection and security measures, it's their remote workers who can cause a potential disaster as a result of poor, inconsistent security policies and a lack of knowledge on what to look out for and how to behave in this online and hyper-connected world. The lack of effective processes or procedures could compromise critical data and cause disruption with serious consequences.

With digital adoption accelerating, cybersecurity has become a key area of focus because many businesses have already suffered attacks infiltrating their networks or systems over the past year. This is largely due to the rapid shift between on-premises and remote working.

It has required businesses to quickly ramp up their digital transformation efforts by adopting cloud computing and many have unfortunately not realised that the security controls they deploy in the office environment are not exactly the same as what is required in the new world of remote working.

Although some still view remote set-ups as temporary, most employees will most likely be allowed to work remotely in future. It is therefore important for businesses to make sure employees have the technology they need to be productive and know what it is that they need to do to remain secure.

Prioritising cybersecurity

Cyber criminals have become increasingly sophisticated over the past few years and businesses must remain cognisant of evolving threats if they want to protect their information assets. They need to design security controls that are not only effective against threats of today, but also provide the ability to adapt and provide protection against the unknown threats of tomorrow.

Having the best firewall in place at the office doesn't provide protection against threats aimed at people working remotely. It is about more than just a mobile phone and laptop, it extends to reliable Internet access, secure access and processes to attend virtual meetings and access data.

More importantly, implementing a user-centric cyber resilience program that covers insider threats and ongoing user cybersecurity awareness training is crucial.

Sometimes prioritising cybersecurity can be difficult if business executives consider it an unnecessary expense. Unfortunately, they often don't always realise the extent of the losses that will come from a security breach. All it takes is one successful simple phishing scam to be the first step in a total breach and end up in data loss, ransomware or other extortion attempts.

Most companies, big or small, cannot afford extended downtime from a cyberattack, especially while trying to determine what sensitive data was stolen and which regulatory body, customer or supplier will need to be notified of the breach. Smaller businesses are even at bigger risk because the effects of a cyberattack could be more devastating for them and a data breach could mean the end for most start-ups.

Educating employees

Businesses just cannot afford to neglect user-based activity monitoring and cybersecurity awareness training, it could be catastrophic. Education is key to ensuring that businesses are protected from cyberattacks. To be effective, the training must be consistent, engaging and provide real examples of what to look out for to make any difference. Engaging training and an easy-to-use platform will get staff talking about cybersecurity issues and discussion provides greater understanding.

Business needs to hold everyone to the same standard for adopting cybersecurity protocols. Nobody should get a ‘free pass’ when it comes to cybersecurity awareness training because of their designation. Executives are ultimately responsible for the secure use of company assets and must ensure that nobody is allowed to break security protocols.

Cybersecurity practices are sometimes seen as a burden and this could entice remote workers to find workarounds because they believe it might increase productivity. Open communication and practical security controls, with increased visibility, will drive good cybersecurity practices into the DNA of one's remote workforce.

Ensuring total visibility will prevent mistakes, allow one to respond immediately to threats and ensure patches, training and other items are properly managed. Visibility allows one to control compliance and cybersecurity issues and will give a view on anybody who may install unverified apps on their work devices, be it sending sensitive or confidential work documents to personal email addresses or even sharing passwords.

Work devices have now also become personal devices, remote workers also often let family members use their work computer for non-work-related activities. Allowing family members to use a work device could expose the entire corporate network to significant risk and every business needs to assess their policies and measure their risk exposure when personal activity is conducted on work devices.

In certain instances, this might not be allowed at all and clearly explaining this to the users is critical. However, until one has visibility, there is no way of knowing what is really happening at the end-point, it will just be a guess. Guesswork is not a recommended method to ensure data security.

Employers should make sure that they have visibility of what is really taking place with their data and on their systems to reduce their risk exposure. This is bolstered by educating their remote workers on what to look out for and how to identify potential breaches.

While it’s near impossible to stay entirely secure, there are basic rules that remote workers can follow to reduce the risks in this new working environment and total visibility and monitoring gives you the capacity to respond to changes before damage is done.

For more information contact J2 Software, +27 11 794 1096,,


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

More is less in cybersecurity
Issue 2 2021 , Cyber Security
Post-pandemic paradox: more solutions do not bring better protection. Despite 80% of organisations running up to 10 different protection and cybersecurity solutions simultaneously, more than 50% of them experienced downtime from data loss last year.

Ransomware and Microsoft Exchange Server attacks are surging
Issue 2 2021 , Cyber Security
Check Point Research sees global surges in ransomware attacks, alongside increases in cyberattacks targeting Microsoft Exchange Server vulnerabilities at a time where CISA has raised the alarm about ransomware attacks against Microsoft Exchange servers.

Malware disguised as meeting apps spiked by 1067%
Issue 2 2021 , Cyber Security
Atlas VPN analysis reveals that cyber threats disguised as videoconferencing applications jumped by 1067% in a year. The data analysed was provided by Kaspersky.

The realities of AI in cybersecurity: catastrophic forgetting
Issue 2 2021 , Cyber Security
There is a lot of hype about the use of artificial intelligence (AI) in cybersecurity. The truth is that the role and potential of AI in security is still evolving and often requires experimentation and evaluation.

Cyber makes it secure
Issue 2 2021 , Cyber Security
Stas Protassov, Acronis co-founder and technology president comments on the recent hacking of over 150 000 Verkada surveillance cameras.

Security patches are not a plan
Issue 2 2021, Galix Group , Cyber Security
Patches are undoubtedly an essential component of a cybersecurity strategy, but with the current digital landscape, with many employees continuing to work from home, patches alone are not sufficient.

Sophos unveils XGS firewall appliances
Issue 2 2021 , Cyber Security
Sophos unveils XGS firewall appliances with optimised Transport Layer Security (TLS) inspection in light of new research that identifies a surge in cybercriminals using TLS to carry out attacks.

Kaspersky reveals five ways ransomware gangs play today
Issue 2 2021 , Cyber Security
] Over the past few years, the methods cybercriminals use to distribute ransomware has changed dramatically. While a few years ago, they would spread encrypted files on a large scale, today their ransomware attacks have become more focused.

Safe, friction-free user interactions
Issue 2 2021 , Cyber Security
F5 announced the addition of new SaaS products to its application security portfolio: Device ID and Shape Recognize make use of unique data and analytics capabilities, streamlining customer experiences by removing login friction for users while guarding against fraud.

Healthcare, cybersecurity and the COVID-19 vaccine supply chain
Issue 2 2021 , Cyber Security
Understanding why the COVID-19 vaccine supply chain is being targeted and how to protect against such attacks is vital for IT leaders who understand that healthcare and cybersecurity must now go hand-in-hand.