search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Remote/Hybrid workforce


Remote working and how businesses are risking their data


Luis Navarro, Co-Founder of Totality Services shares the most prominent cybersecurity risks that companies face with a remote and hybrid workforce and tips on how to mitigate them.


T


he COVID-19 pandemic, and the UK Government’s message for employees to ‘Stay home. Protect the NHS. Save


lives’, forced UK firms to revaluate their entire operation. Companies were forced to seek measures that facilitated the global shiſt from centralised staff operating within a tightly controlled LAN (or series of connected LANs), to an inherently less secure remote setup featuring residential broadband connections and all manner of endpoints. Tech firms are adaptable by nature. Tey


have to be, in order to survive within what is an intensely competitive sector that rarely has time for organisations who rest on their laurels, or whose modus operandi is to seek the cheapest solution to their problems, rather than taking the time to develop effective, functional solutions to the challenges of the digital age. Without blowing our own horns too much, the same cannot be said for certain other sectors within the UK business community. As with most other aspects of commercial IT, when it comes to


34 | December/January 2022


remote working, there’s a right way to do it, and a wrong way to do it… and a VERY wrong way to do it. Let’s take a look at how businesses have reacted to the new environment, and what it means for data security as a whole.


Personal vs. company equipment When Boris Johnson told firms to get their staff working from home on March 20th 2020, the first question most business owners asked is “With what?”, and understandably so. Companies had no reason to keep a reserve asset pool of laptops and mobile devices that covered every last office-based employee, so most staff were asked to use their own devices. Responsible firms (or at least, those with the financial ability to) took the advice of their IT department, acknowledging that


personal devices present far more of a risk to commercial data than a centrally managed company laptop does, and set about acquiring additional hardware. Not all firms took the same approach. Once companies realised


www.pcr-online.biz


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68