Remote working and Cyber Security: Georgia Crossland and Amy Ertan

Introducing the project
The shift to remote working represents a huge shift for employees and organisations alike, introducing significant implications for cyber security. Amy Ertan and Georgia Crossland are currently working on a research project, in collaboration with the Research Institute for Sociotechnical Cyber Security (RISCS) and funded by the UK National Cyber Security Centre (NCSC), on the impact of remote working on cyber security and wellbeing. This blog post will give an overview of a section of this project, how remote working impacts cyber security.

In response to COVID-19, in March 2020, organisations across the world made the rapid shift away from physical office working to remote working, wherever possible. This shift has had a significant impact across many aspects of organisations. This blog post will offer a high-level overview of how the cyber threat landscape was impacted for many organisations and may further change organisational cyber resilience.

Remote working and cyber risks
In terms of connecting to the organisation’s network, the rise of employees’ using their own devices to carry out their ropes (particularly if the organisation had been desktop-based), raises the potential for less secure devices to introduce vulnerabilities.

Incorrectly configured VPNs can create a false sense of security at best and expose the organisation’s networks to insecure personal devices at worst. The use of virtual machines or secure corporate devices, when properly configured, can mitigate the threats to confidentiality as users connect their devices to the network. With the rise of a huge variety of online collaboration tools, new vulnerabilities are created in which data may leave the firm in various ways (for example, through file-sharing applications). Therefore, there has been an increase in attack vectors that could lead to the exposure of information. There is a balance for organisations in balancing security and flexibility; locking down on the use of any collaborative tools, for example, prevents data leakage outside of trackable means such as emails - but runs the risks that employees will feel overly constrained and resort to their own workarounds. These workarounds, which might include using their personal devices to join meetings on platforms not supported by corporate devices or using tools that are not approved by the organisation’s security function, are termed ‘shadow IT practices’ in that they are informal and not viewable to security staff - who are then unaware of the vulnerabilities that may arise as a result.

Other risks relate to more human-centred issues, such as proximity to others. Employees should, in the organisation’s eyes, not share sensitive information with people around them. However, many people now live in house shares, posing the problem of others overhearing confidential information. This could be of particular issue for certain professions, for example if lawyers from competing firms live together

With the blurring of an employees’ work and home space, employees may have different security habits (for example, not locking their laptop when they leave their desk).

COVID-19 and the cyber threat landscape
There are many actors across the cyber threat landscape. From sophisticated state actors to cybercriminal groups ranging across the full spectrum of capabilities, to terrorists/ ‘hacktivists’, to a disgruntled employee with access to sensitive information or applications. Through COVID-19, there has been a steep increase in reported ransomware attacks, with users typically tricked into infecting their devices by COVID-themed emails with malicious executables. Similarly, COVID-19 ‘phishing’ emails have tricked users into entering their credentials onto malicious domains. There is also evidence that malicious cyber actors have been attempting to leverage remote access vulnerabilities, targeting both the end-user’s devices and connectivity points (ie through VPN software) to gain access to organisations’ networks.

Graphical user interface, text, application, email

Description automatically generated

A screenshot of a scam email. Upon ‘accepting’ the email to register for the vaccine, users were asked to pay a fee. Image Source: Twitter 


Impact on employees  

In addition to the threat landscape and the move to remote working which required technological changes for many companies, there have also been behavioural and mental impacts for those in the cyber security area. Previous to the pandemic, surveys have demonstrated concern for Chief Information Security Officers (CISOs) stress and wellbeing (Nominet, 2019). The majority of the 800 CISO’s in the Nominet survey reported being moderately or tremendously stressed in their day-today job. CISOs report working beyond contracted hours, not taking holiday or sick leave. Furthermore, the board consistently underestimates the impact that stress and long-hours are having on the CISO. This then negatively impacts the organisation, as stress prevents CISOs from performing efficiently and can result in burnout (Nominet, 2019). The average tenure of a CISO is just 26 months.  


Given the increased technological concerns and changing threat landscape discussed in previous paragraphs, the COVID-19 pandemic has likely aggravated the stress issue for CISOs and security teams. In fact, according to a ‘Cost of a Data Breach’’ report by IBM (2020), 76% of respondents say remote work would prolong the time needed to identify and contain a security breach, while 70% said it would increase the cost of a breach. Moreover, CISOs now need to anticipate new and evolving opportunistic attacks, motivate their teams and motivate employees to behave securely.
 


There is limited research into how cyber security awareness training might need to be changed and developed to better aid employees. Cyber security practices in the home are different from those in the office, for example connecting to VPNs. Employees trained in new behaviours and practices they may need to adopt. Studies have found that remote employees differ from office employees in their perceived levels of security and privacy policy awareness and compliance intentions (Johnston et al., 2010). These findings suggest that the lack of direct support in remote environments reduces remote employees’ ability for awareness of security. Hence, this is another pressure for security awareness teams and the organisation as a whole. 


Going Forward  

To date, the existing literature isn’t able to account for how employees react to prolonged mandated remote working in times of crisis. Research published before COVID-19 assumes that remote working is a positive attribute in representing an optional opt-in employee benefit, and there is little research examining the impact of prolonged crisis on employee cyber security approaches.  

 

The research so far highlights the importance of recognising employees’ experiences through the pandemic, including but not exclusively security colleagues. Our current study involves interview outreach with CISOs across a range of sectors, looking at how their organisation has been impacted by remote working, in terms of cyber security, employee wellbeing, and perceived changes to organisational resilience. A white paper with the full findings of this project will be published in Spring 2021. 


References 
 
ENISA -  European Union Agency for Cybersecurity. ENISA Thread Landscape 2020 - Ransomware. ENISA. https://www.enisa.europa.eu/about-enisa  
 
IBM. (2020). The Cost of a Data Breach. IBM 

 

Johnston, A. C., Wech, B., Jack, E., & Beavers, M. (2010). Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes. In AMCIS (p. 493). 
 

 


Comments

  1. I like the valuable information you provide in your articles. I'll bookmark your blog and check again here regularly. I am quite sure I'll learn many new stuff right here! Good luck for the next! .information security policy

    ReplyDelete
  2. The information which you have provided in this blog is really useful to everyone. Thanks for sharing.
    Remote Access Solution
    Network Infrastructure Design and Build

    ReplyDelete
  3. Israeli Lawyer Moshe Strugano says, The tendency for employees to connect to the company network using their own devices (especially if the company was desktop-based) increases the risk of vulnerabilities being introduced by less secure devices.

    ReplyDelete
  4. Free and available Wi-Fi is always a nice bonus of visiting public places. In today’s world, almost every cafe, airport, restaurant, bar or club has the opportunity to use free Internet access using a smartphone or laptop. best cybersecurity company in United kingdom

    ReplyDelete
  5. The information you are disseminating is excellent since you should think about how to secure your data from cyber attacks before beginning a new business. Skyline IT Management offers services like IT support and cyber security Edmond OK if you want to understand more in-depth.

    ReplyDelete
  6. You provide really valuable information about cybersecurity topics. Cybersecurity is a field that deals with ways to protect systems and services from cybercriminal activities including spammers, hackers, and cybercriminals. While certain cyber security components are built to launch an assault right away, the majority of modern specialists are more concerned with figuring out how to safeguard all assets, from computers and cellphones to networks and databases, against attacks. You have really good knowledge about this topic. I am looking for managed cybersecurity services for my small company, please suggest to me.

    ReplyDelete
  7. I really appreciate the hard work you have put into this blog. Thank you! You can check our cyber security solution services.

    ReplyDelete
  8. Excellent work, but it's really challenging to locate a managed IT service provider Edmond OK, given the rising need for IT help.

    ReplyDelete
  9. This comment has been removed by the author.

    ReplyDelete
  10. In today's world of digitalization, the need for cybersecurity has become more important than ever. As technology advances, so do the threats and risks of cyberattacks. This is why Cyber Security in Gurgaon
    APTRON is essential for individuals and organizations to keep themselves protected.

    ReplyDelete
  11. This comment has been removed by the author.

    ReplyDelete
  12. This comment has been removed by the author.

    ReplyDelete
  13. Protect your business with top-notch cybersecurity solutions and 24/7 monitoring from a trusted Managed Security Services Provider (MSSP).


    WyDur's Managed Endpoint Security solutions offer advanced protection against cyber attacks. With our cutting-edge technology and experienced team, you can rest assured that your devices and network are fully protected. Trust WyDur to keep your business safe and secure.


    Managed Security Services in Hyderabad

    ReplyDelete
  14. I appreciate you providing this useful blog piece. In our current digital landscape, the significance of Managed Cyber Security Services and remote work in Cybersecurity is rapidly escalating. It's fascinating to see how organizations are navigating the delicate balance between enabling flexible work arrangements and ensuring robust cybersecurity measures. I'm eagerly anticipating the full findings of the research project as well.

    ReplyDelete
  15. Nice article, thank you for sharing the valuable information.
    Best Cybersecurity Services.

    ReplyDelete
  16. Thanks for sharing this article about the cyber security and trendzguruji.me cyber. I really enjoy reading and also appreciate your work. You are provided very good knowledge.

    ReplyDelete
  17. Comprehensive Cybersecurity Solutions for Business Continuity

    Cybersecurity services offer comprehensive protection for businesses, safeguarding data and systems from cyber threats. This encompasses proactive measures like vulnerability assessments and employee training, alongside reactive incident response to swiftly recover from attacks.

    ReplyDelete
  18. This is one of the most incredible blogs I've read in a very long time. The amount of information in here is stunning,penetration testing company india

    ReplyDelete
  19. Explore the intersection of remote working and cyber security with insights from Georgia Crossland and Amy Etan. Learn how SAITECH INCORPORATED is at the forefront, empowering businesses to navigate the evolving landscape of remote work securely, safeguarding data and networks against cyber threats.

    ReplyDelete
  20. Remote working is seamless with experts like Georgia Crossland and Amy Ertan ensuring top-tier cyber security. Their dedication makes remote collaboration safe and efficient Outsource Sharks Corporation







    ReplyDelete
  21. It is a good post to read. if you looking an information about cyber scams in gurugram please check it.

    ReplyDelete
  22. Insightful collaboration on remote work and cyber security! Georgia Crossland and Amy Ertan provide invaluable perspectives for navigating today's digital landscape. A must-read! Let Us Dream Marketing

    ReplyDelete
  23. Feshop Feshop facilitates the illegal trade of stolen credit card information. Engaging in any transactions on this platform is illegal in most jurisdictions.

    ReplyDelete
  24. Thank you, Georgia Crossland and Amy Ertan, for this insightful post on remote working and cybersecurity. Your research highlights critical vulnerabilities and the immense pressure on CISOs during the pandemic. It's a timely reminder of the evolving cyber threat landscape. FYI Solutions offers cyber security services to help organizations mitigate these risks.

    ReplyDelete
  25. What is hacking in cyber security?
    Hacking in cyber security services refers to the practice of exploiting vulnerabilities in computer systems, networks, or software to gain unauthorized access or cause harm. Hackers can use various techniques, such as phishing, malware, or exploiting software bugs, to infiltrate systems. While hacking is often associated with illegal activities, ethical hacking, or "white-hat hacking," is used by cybersecurity professionals to identify and fix security weaknesses to protect against malicious attacks.

    ReplyDelete
  26. very nice… i really like your blog. Very useful informations. Thanks, we also provide service for cyber security companies near me.For More Information visit our website.

    ReplyDelete
  27. It's clear you've put a lot of effort into ensuring readers can take away valuable insights.
    Amazon Store in Dubai

    ReplyDelete
  28. Insightful discussion by Georgia Crossland and Amy Ertan on securing remote work setups. Essential read for modern cybersecurity strategies! very gald to read this information. Cyber Security Dubai

    ReplyDelete

Post a Comment

Popular posts from this blog

New Publication: Remote Working and (In)Security?: Amy Ertan

The Artificial Intelligence Monster: Nicola Bates