IT managers fear remote working data leaks

Businesses are concerned over potential security issues arising from remote working and guest network access, according to report.

Technology bosses, under pressure to make corporate networks more open, fear data leaks could result, according to a report.

Research from AEP said that 91 per cent of UK and North American IT executives think that factors such as remote working and outsourcing create a greater risk of sensitive data being accessed by prying eyes.

They also believed that wider network accessibility would also mean that there would be much wider risk from malicious content, with 89 per cent fearing a greater threat from malware. Similarly, 85 per cent felt there was more likelihood of hacking.

"On the one hand, IT managers are rightly under pressure to open the network door to partners, suppliers and customers, to improve efficiency, and enhance business processes," said Reginald Best, chief operating officer of AEP networks.

"On the flip-side, they're sweating over how to prevent unauthorised access, protect company information and deflect malicious attacks."

Although the vast majority of IT execs knew the risks, they also realised more open networks were inevitable, with 94 per cent either already or planning to allow access to remote workers.

Over half of them permit or plan to permit access to contract staff or external IT support, but interestingly for some this openness also spreads to customers and guests.

To deal with the security issues, IT departments are spending more on new technology. The report revealed that 48 per cent of execs would stretch their security budgets to secure remote access in the next year.

Other solutions mentioned were network access control (41 per cent), identity-based network security solutions (37 per cent) and encryption (35 per cent).

Best said that there were many questions that IT needed to ask itself about how to safeguard more open networks: "What systems should specific types of remote workers be allowed to access? What should you do about visitors who don't have the required antivirus software on their machines but need to work on your network?"

"And what about providing a safe access to users who want to log in from third party locations such as internet cafes? How does the organisation track and audit access? These are the types of issues for which organisations need to develop policies," Best added.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020