Remote employees pose a security risk, says IBM Security
X-Force Red is helping companies improve work-from-home security
More than half of survey participants have no new security policies for working from home, which has exposed them to security risks and left them worried about potential cyberthreats in their home office.
More than 50% of US employees are working from home, and many will continue to do so through 2020 and into the foreseeable future. As a result, many companies are trying to deal with the security risks involved with remote work.
Many business activities that occurred with protected and monitored office environments have transitioned to less secure home environments. For example, some customer service agents are working with sensitive customer data from insecure home offices.
IBM X-Force Red is expanding its security testing efforts to help organizations design secure frameworks that address security issues with employees working remotely. The practice will examine systems that expose intellectual property, and client and employee data to security risks, including video conferencing, file sharing and other collaborative platforms.
The practice will include conducting remote work adversary simulations, work-from-home application penetration testing and phishing exercises.
"Organizations need to use a risk-based approach with work-from-home models, then reassess and build from the ground up," said Charles Henderson, global partner and head of IBM X-Force Red. "Working from home is going to be a long-lasting reality within many organizations, and the security assumptions we once relied on in our traditional offices may not be enough as our workforce transitions to new, less controlled surroundings."
The IBM Security Work from Home Survey, which was conducted by Morning Consult, collected responses from over 2,000 US employees who were new to working from home. The survey found the following:
- Of employees new to working from home, 93% are confident their companies will keep personally identifiable information (PII) secure. However, 52% are working from personal laptops without new security tools, and 43% haven’t been trained with new security guidelines.
- More than half of those employees haven’t received guidelines on handling highly regulated PII, despite over 42% of them working with PII as part of their duties.
- Over half are not aware of new company policies on handling customer data, managing passwords or other security issues.
- Over 50% of respondents are using their own computers to do business work, while 61% have not received security tools to protect their devices.
- Two-thirds of employees don’t have new password-management guidelines, while 35% are reusing personal passwords for business accounts.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download