BYOD and Remote Working: A Significant Threat

BYOD and Remote Working

BYOD And Remote Working: A Significant Threat

The past year has seen many firms successfully navigate the new world of remote working. However, the rush to establish a new distributed workforce, combined with changing working patterns and employee behaviour, means that many of those firms are facing an increased risk of cyberattack. As a consequence, we have seen a worrying increase in cases of email account takeover and ransomware attacks.

Common security concerns stemming from remote working now include:

  • Data leaking through endpoints
  • Users connecting with unmanaged devices
  • Maintaining compliance with regulatory requirements
  • Remote access to core business apps
  • Loss of visibility over user activity

All these problems actually fall under one umbrella: the dissolution of the traditional perimeter. Many employees are now working from outside the security protection that their office networks would usually provide. There is no better example than employees using personal devices to do their job.

BYOD and remote working

The concept of Bring Your Own Device (BYOD) has existed for many years now within an office environment. It is common to see employees using their own smartphones for work purposes, for example. However, an alarming lack of control and visibility exists with employees using their personal devices for working at home.

The rapid shift to remote working meant some employees had to make do with using their unsecured personal devices in the absence of company-issued devices. Even today, employees are working on home PCs or laptops that may also be used by others, including their children. Elsewhere, we’ve seen employees entering their passwords for important enterprise systems, which are syncing with their children’s tablets or other family-used devices.

These unsecured smartphones, laptops and mobile devices are often the most vulnerable endpoints or entry points to firms’ networks and enterprise systems. Risks include data leakage, users downloading unsafe apps or content, lost or stolen devices, unauthorised access to data and systems and risk of malware infections.

Research by the Ponemon Institute highlights how BYOD has decreased organisations’ security posture. Sixty-seven percent of security pros say remote workers’ use of their own mobile devices such as tablets and smartphones to access business-critical applications and IT infrastructure has decreased their organisations’ security posture.

The problem is compounded when almost a third of respondents say their organisations do not require remote workers to use authentication methods, and only 35 percent say they require multi-factor authentication (MFA).

It is worth noting that it is not just traditional ‘work’ devices like mobile phones or laptops that pose a security risk. New figures commissioned by the government show almost half (49 percent) of UK residents have purchased at least one smart device since the start of the coronavirus pandemic. These smartwatches, TVs and cameras sit on the same home wireless network as those work devices and also remain vulnerable to cyberattacks.

Technology, people and processes

With the perimeter falling away, firms are looking to technology solutions, alongside policy, governance and training to mitigate the security risks.

From a tech standpoint, firms need to ensure authentication and device management is in place – it is important that remote workers using their own devices have enabled basic security features such as the PIN, fingerprint or facial ID feature. MFA is an important tool for stopping traditional credential harvesting methods and should be extended as far as possible.

Going further, more firms are embracing the concept of ‘zero trust’. This model means that no user or system, either inside or outside the cloud, is trusted until they have been verified. The concept can be applied to technologies, devices and employees’ work practices. Verifying users is achieved through technologies like MFA, identity access management (IAM), encryption and permissions systems.

As well as mitigating the risks to the services and data being accessed, firms should consider the risk to client data that is being processed or residing on personal devices. This will vary considerably according to which BYOD approach they have deployed and how it is configured.

Aside from looking to technology to help mitigate risk, one of the most important things a firm can do is to educate employees and maintain their awareness of cyber threats. So, any solution should be introduced alongside ongoing security awareness training, and formal policies introduced that lay out the procedures for working from home from a cybersecurity standpoint.

Many firms tell us they are likely to continue increased levels of remote work in the future. Visibility and management across the newly distributed workforces will be crucial. This means firms must tackle the problem of BYOD and look to technology and processes that can provide visibility and greater security for employees when working remotely.

mitigo logo
All businesses today are built around 3 things: technology, people and process. Cyberattacks in some way threaten all of these. However, people tend to focus on the technology aspect of the attack rather than the cause. Not Mitigo. Working in this industry taught us straight away that cybersecurity isn’t simply a ‘technology’ problem. It’s much broader than that and will always involve your technology, people and processes. Better and better technology isn’t a solution, it’s just better technology; because if no one’s using the technology properly, how can it ever be secure.

Get in Touch with Mitigo

For help with you or your firms’ needs,
please get in touch by filling in the form below.

Request a Callback