SlideShare ist ein Scribd-Unternehmen logo
1 von 21
“IMPACT OF REMOTE WORK:
NEW THREATS AND
SOLUTIONS”
Seminar
on
IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS
Presented Guided
By By
Preeti.D Dr Dayanand J Sir
(3gn17cs063)
Contents
• Introduction
• But why are remote workers a target for cyber attackers?
• Weaponised artificial intelligence (AI)
• Social media Attack
• Data Privacy
• Few suggestions based on the survey responses.
• Conclusion
Introduction
• Employees working from home face a new world of workplace challenges. With childcare facilities
mostly closed, many are juggling crying babies or barking dogs, all while tending to job
responsibilities.
• Governments are reconsidering ways to ensure that their countries are stable by developing and
enforcing new economic plans.
• Nevertheless, while the world is focused on the health and economic threats posed by COVID-19,
cybercriminals around the world undoubtedly are capitalizing on this crisis.
• Insider threats can stem from either “negligent insiders” – which according to Proof point is the
most common and accounts for 62 percent – or from malicious insiders, who intentionally steal
data or company secrets.
But why are remote workers a target for cyber attackers?
• Cybercriminals are aware that a lot of businesses were thrown in the deep end with the
pandemic. Businesses weren’t set up for remote working, and therefore didn’t have the
right security protocols in place.
• In March 2020, when most businesses started working remotely, global organizations saw
a 48% spike in ransom ware attacks. These attacks are often in the form of phishing,
either by text, instant messaging, email, and third-party applications.
• Recently, Microsoft has released a study on COVID-19’s effect on cybersecurity They
surveyed nearly 800 business leaders from companies with more than 500 employees
across the UK, US, Germany, and India to better understand how the pandemic is
affecting the cybersecurity industry, including implications on budget and the long-term
effects on the IT landscape.
• At the start of quarantine, Security and IT teams were tasked with
providing secure remote access to all company resources, apps, and data. In order to
successfully allow employees to work from home, there were several technology
investments that needed to be made. According to Microsoft’s study, the top
5 cybersecurity investments since the beginning of the pandemic include multi-factor
authentication (MFA), endpoint device protections, anti-phishing tools, VPN, and end-
user security education.
Weaponised Artificial Intelligence
• Hackers are using their own automation to attack business networks and
systems from those working remotely.
• To prevent this happening, businesses need to use endpoint security
systems – which so far, only 46.9% of businesses with remote employees
are using. So, in 2021, we expect remote workers to become more
accustomed with endpoint cyber security systems.
Why are they targeting social media platforms?
• Most social media platforms provide poor authentication processes and
little verification in order to access accounts, meaning that social media
attacks are easier than you might think.
• The URL leads to a malicious website that collects personal information
and credentials in order to compromise multi-factor authentication
solutions
Data Privacy
• As we all know, businesses create, collect and store a lot of data, and these digital
footprints are only getting bigger year on year. Data is now one of the most valuable
assets in the world, cited as the new oil.
• If you’re thinking about getting a VPN, getting it from a trusted provider should be your
top priority. There are likely to be other trends in cyber security that will rear their heads
as 2021 progress.
• Router Configuration
The security of your home network begins with properly configuring your router. A
trivial step such as changing the password of your router’s backend from the default
password can go a long way in preventing it from being hacked.
• Updated Software
This holds true for software in general and security tools in particular. Most rolled out
updates cover the vulnerable aspects of security, as and when weaknesses are identified.
This holds equally true for software that pertain to productivity or security.
• Regular Backups
While organizations have an elaborate plan for backing up data regularly, you also need
to start doing that for your important data. Ideally, there should at least be two backups that
are isolated from your officially issued device and home network itself.
• Suspicious Emails
This is emerging as a major problem for organizations. You need to be extra vigilant
about suspicious emails that at first glance, may seem like an official communique. Avoid
clicking on suspicious links embedded within emails, asking you to do certain things.
• File Sharing Practices
A file that’s of routine nature to you may be a valuable intellectual property for a cyber
thief. So, you must avoid sharing files over your home network when using social media
platforms or insecure collaborative tools.
• Virtual Meeting Software
The demand and use of virtual meeting and collaborative solutions has skyrocketed
due to the present circumstances. By following the simple security guidelines issued by
these software platforms, you can keep your home network and PC safe from many threats
Conclusion
Remote work is a reality that we all will have to cope with. The regular use
of our home networks is part of this new work paradigm. While we can
never achieve enterprise grade protection at our homes, we can surely avoid
and mitigate most threats.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Was ist angesagt? (20)

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Ă„hnlich wie IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
caniceconsulting
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 

Ă„hnlich wie IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS (20)

Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 

KĂĽrzlich hochgeladen

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

KĂĽrzlich hochgeladen (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

  • 1. “IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS”
  • 2. Seminar on IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS Presented Guided By By Preeti.D Dr Dayanand J Sir (3gn17cs063)
  • 3. Contents • Introduction • But why are remote workers a target for cyber attackers? • Weaponised artificial intelligence (AI) • Social media Attack • Data Privacy • Few suggestions based on the survey responses. • Conclusion
  • 4. Introduction • Employees working from home face a new world of workplace challenges. With childcare facilities mostly closed, many are juggling crying babies or barking dogs, all while tending to job responsibilities. • Governments are reconsidering ways to ensure that their countries are stable by developing and enforcing new economic plans. • Nevertheless, while the world is focused on the health and economic threats posed by COVID-19, cybercriminals around the world undoubtedly are capitalizing on this crisis. • Insider threats can stem from either “negligent insiders” – which according to Proof point is the most common and accounts for 62 percent – or from malicious insiders, who intentionally steal data or company secrets.
  • 5. But why are remote workers a target for cyber attackers? • Cybercriminals are aware that a lot of businesses were thrown in the deep end with the pandemic. Businesses weren’t set up for remote working, and therefore didn’t have the right security protocols in place. • In March 2020, when most businesses started working remotely, global organizations saw a 48% spike in ransom ware attacks. These attacks are often in the form of phishing, either by text, instant messaging, email, and third-party applications.
  • 6. • Recently, Microsoft has released a study on COVID-19’s effect on cybersecurity They surveyed nearly 800 business leaders from companies with more than 500 employees across the UK, US, Germany, and India to better understand how the pandemic is affecting the cybersecurity industry, including implications on budget and the long-term effects on the IT landscape. • At the start of quarantine, Security and IT teams were tasked with providing secure remote access to all company resources, apps, and data. In order to successfully allow employees to work from home, there were several technology investments that needed to be made. According to Microsoft’s study, the top 5 cybersecurity investments since the beginning of the pandemic include multi-factor authentication (MFA), endpoint device protections, anti-phishing tools, VPN, and end- user security education.
  • 7.
  • 8.
  • 9. Weaponised Artificial Intelligence • Hackers are using their own automation to attack business networks and systems from those working remotely. • To prevent this happening, businesses need to use endpoint security systems – which so far, only 46.9% of businesses with remote employees are using. So, in 2021, we expect remote workers to become more accustomed with endpoint cyber security systems.
  • 10. Why are they targeting social media platforms? • Most social media platforms provide poor authentication processes and little verification in order to access accounts, meaning that social media attacks are easier than you might think. • The URL leads to a malicious website that collects personal information and credentials in order to compromise multi-factor authentication solutions
  • 11. Data Privacy • As we all know, businesses create, collect and store a lot of data, and these digital footprints are only getting bigger year on year. Data is now one of the most valuable assets in the world, cited as the new oil. • If you’re thinking about getting a VPN, getting it from a trusted provider should be your top priority. There are likely to be other trends in cyber security that will rear their heads as 2021 progress.
  • 12.
  • 13.
  • 14.
  • 15. • Router Configuration The security of your home network begins with properly configuring your router. A trivial step such as changing the password of your router’s backend from the default password can go a long way in preventing it from being hacked. • Updated Software This holds true for software in general and security tools in particular. Most rolled out updates cover the vulnerable aspects of security, as and when weaknesses are identified. This holds equally true for software that pertain to productivity or security.
  • 16. • Regular Backups While organizations have an elaborate plan for backing up data regularly, you also need to start doing that for your important data. Ideally, there should at least be two backups that are isolated from your officially issued device and home network itself. • Suspicious Emails This is emerging as a major problem for organizations. You need to be extra vigilant about suspicious emails that at first glance, may seem like an official communique. Avoid clicking on suspicious links embedded within emails, asking you to do certain things.
  • 17. • File Sharing Practices A file that’s of routine nature to you may be a valuable intellectual property for a cyber thief. So, you must avoid sharing files over your home network when using social media platforms or insecure collaborative tools. • Virtual Meeting Software The demand and use of virtual meeting and collaborative solutions has skyrocketed due to the present circumstances. By following the simple security guidelines issued by these software platforms, you can keep your home network and PC safe from many threats
  • 18.
  • 19.
  • 20. Conclusion Remote work is a reality that we all will have to cope with. The regular use of our home networks is part of this new work paradigm. While we can never achieve enterprise grade protection at our homes, we can surely avoid and mitigate most threats.