[qodef_icon_with_text icon_pack=”simple_line_icons” simple_line_icons=”icon-location-pin” icon_position=”left” icon_type=”normal” icon_size=”qodef-icon-tiny” icon_animation=”” icon_margin=”3px 0 0 0″ title=”1801 Saint Clair Ave. NE” title_tag=”h6″ text=”Cleveland, OH 44114″ custom_icon_size=”28″ text_color=”#212121″ text_left_padding=”0″ icon_color=”#7c7c7c” title_color=”#212121″]

[qodef_icon_with_text icon_pack=”simple_line_icons” simple_line_icons=”icon-call-out” icon_position=”left” icon_type=”normal” icon_size=”qodef-icon-tiny” icon_animation=”” icon_margin=”3px 0 0 0″ title=”216.619.2000″ title_tag=”h6″ text=”888.626.3828″ custom_icon_size=”28″ text_color=”#212121″ text_left_padding=”0″ icon_color=”#7c7c7c” title_color=”#212121″]

50% Of All Work from Home Employees Are Ignoring Cybersecurity Protocols

50% Of All Work from Home Employees Are Ignoring Cybersecurity Protocols

According to a recent study, more than half of work from home employees are putting their organizations at risks for a cybersecurity attack by being lax about security protocols. 

With an increase of almost a third of the country working from home due to covid-19, the amount of risk for organizations to suffer an online attack is growing exponentially. 

Analysis by researchers at a large cybersecurity company reveals that 52% of employees believe they can get away with riskier behaviour when working from home, such as sharing confidential files via email instead of more trusted mechanisms.

Some reasons given include the convenience of using their own device as well as taking liberties because they know they’re not under the scrutiny of IT and the security team. 

Others who answered the survey, however, gave less malicious reasons. Some have been cutting corners simply due to working from home with the added chaos of kids in the house, room-mates, no proper office setup etc. 

Additionally, half of those surveyed reported they’ve had to find workarounds to standard policies in order to stay efficient, suggesting current policies are too strict for remote employees to adapt successfully. 

If your company’s security policies or data protection policies do not incorporate the home network, then steps should be taken to update those policies as soon as possible.

Policies must include remote workers and approved methods for remote access. They must include data storage, and safe data handling. If you have compliance requirements, these too must be modified to incorporate remote data. We’ve put together a guidebook to help navigate these risky waters. Click below to download “5 Risks To Plan For with Work From Home Employees.”