• Register

Data Net Blog

Do You Know Which Remote Users Contribute the Biggest Risks?

Do You Know Which Remote Users Contribute the Biggest Risks?

With so many people working from home right now, businesses have managed to keep their operations going somewhat successfully by using the remote solutions that are available today. While it is fortunate that today’s technology enables businesses to do so, the importance of cybersecurity cannot be understated as remote work is implemented.

Of course, many business owners may anticipate that certain users would contribute a greater level of risk than others. Let’s examine a few trends to see if this expectation holds any water.

The State of Personal Cybersecurity

Let’s consider something so that we can properly frame the rest of our discussion: while you may have established cybersecurity standards in your office that your employees are required to comply with, they may not follow these standards when it comes to their personal computing.

This could potentially lead to issues if remote work is exercised as an option. After all, if operating outside of the protections you’ve established on your network, your users could potentially let in a threat that could then see whatever data or resources your team member has access to. Therefore, it is important that you know what standards your employees hold in terms of their own devices and connections.

A survey released by the National Cyber Security Alliance has revealed a variety of helpful insights pertaining to remote work, so far as personal security standards are concerned. Surveying 1000 American adults, half aged between 18 to 34 years old and half from 50 to 75, a few crucial differences between the behaviors of these two cohorts were identified.

What the Survey Revealed

Somewhat predictably, the younger age group tended to show superior security practices in a few of their responses. 89 percent of the 18-to-34 bracket were likely to utilize two-factor authentication, while 70 percent of the 50-to-75 users did. In 18-to-34, 83 percent checked their software updates regularly, while 63 percent of 50-to-75 users do.

However, looking at the data in a more macro sense, security practices were still inconsistent in both groups, albeit in different ways. While more of the younger crowd would choose to implement two-factor authentication, relatively few of them would update their antivirus and firewall solutions as diligently as they should and greater numbers of them would connect to public Wi-Fi. The data also showed the older survey respondents as being more careful about their data security, and that—despite being primarily made up of the 18-to-34 age bracket—most remote workers were not taking the recommended additional steps needed to reinforce their security.

So, in a way, this survey simply revealed that everyone is lacking in their security practices as they work remotely. It just manifests differently in the 18-to-34 age bracket than it does in the 50-to-75.

What Does This Mean for Your Security Right Now?

The answer to this is simple: you can’t—despite any preconceptions about your users—assume that one age group will be naturally more secure than the other when working, whether in-house or remotely. Therefore, there are a few steps that you need to take so that you can be sure that your team is aware and alert.

First, your team needs to be up to speed on the behaviors that you expect them to follow in and out of the office. This means you need to provide them with different training materials and exercises to help them practice these skills, regularly evaluating your entire team’s shared performance and attending to individuals as need be.

Data Net is here to help you better lock down your team’s cybersecurity, regardless of where they’re working from. Give us a call at (760) 466-1200 to find out more about the solutions and services we have to offer.

Tip of the Week: Maintaining a Work/Life Balance, ...
New Smartphones with New (or Older) Shapes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 28, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency IT Support Privacy Communication Smartphones Hackers Workplace Tips Malware Microsoft Google User Tips Hardware Email Users Small Business Cloud Innovation Software VoIp Communications Mobile Device Computer Business Cybersecurity Mobile Devices Managed IT Services Tech Term Collaboration Internet Android Business Management Ransomware Miscellaneous Hosted Solutions Outsourced IT Managed Service Cloud Computing Network Windows 10 Social Media IT Services Phishing Covid-19 Passwords Backup Saving Money Browser Information Upgrade Smartphone Apps Data recovery Holiday Wi-Fi Data Backup Gadgets Remote Wireless Facebook Microsoft Office Networking Windows Applications Internet of Things Bandwidth BDR Mobile Office Blockchain Compliance Access Control Chrome Data Breach Automation Apple Managed IT services Save Money Office 365 Employer-Employee Relationship Quick Tips Gmail Remote Work Marketing VPN Patch Management Value Analytics Voice over Internet Protocol Business Intelligence Employee-Employer Relationship Conferencing Router Managed IT Service Health Word Laptop Going Green Data Security Telephone System Company Culture Disaster Recovery Data Management Mobility Physical Security Business Technology Battery Batteries Excel Cortana Tech Terms Cost Management Training Windows 7 Computers Mobile Device Management Scam Wireless Charging Government Remote Computing G Suite Twitter Business Continuity Office Virtual Assistant Virtualization Artificial Intelligence Cybercrime Payment Cards Bring Your Own Device iPhone Password Remote Monitoring and Management RAM Social Network Content Filtering Education Server Medical IT Remote Monitoring Data Protection Settings Healthcare Processor Virus Paperless Office Net Neutrality How To Telephony Connectivity Retail Tech Support WiFi Server Management Paper Computer Repair Recycling Tip of the week Solid State Drive Innovations Fleet Management Voice over IP Operating System IT Display HIPAA Digital Websites Movies Touchscreen Human Resources PCI DSS Eliminating Downtime Customer Relationship Management Taskbar End of Support Specifications Telecommute GDPR Cryptocurrency Remote Workers Project Management Remote Support File Sharing Millennials SSD Alert Vulnerability Knowledge Ink Personal Information IT Service Cleaning Managing Stress Hard Disk Drive Information Technology Multi-Factor Authentication Maintenance Plug-In Hosted Desktop Benchmarks Hard Drive Safety Microsoft Office 365 Regulations Compliance Managed Services Provider BYOD Help Desk Managed Service Provider National Security Lead Generation Data loss Streaming Media Storage Search YouTube Database PowerPoint E-Commerce Mobile Bitcoin Big Data Technology Tips Troubleshooting Video eCommerce Network Attached Storage Environment Internet Explorer Proactive IT Security Cameras Firewall Risk Management Processors Edge Unified Communications Authentication Electronic Health Records Meetings Vendor Wireless Internet Co-Managed IT Congratulations HP Spam Downloads Dark Web Time Management Management Insurance IT budget Customer Service Tip of the Week/Security Holidays Travel Sports Reporting Payment Recovery Botnet Law Enforcement Telecommuting Update Sales Online Shopping e-waste Threat Wearables Profiles User Tip Spyware Dongle Authorization Printer Inventory Amazon Humor Updates WhatsApp Document Management Antivirus Trends Error Chrome OS Remote Working File Management Website Outlook OneNote SharePoint Machine Learning Tactics instant Messaging Virtual Reality Threats Backup and Disaster Recovery Hybrid Cloud Licensing Tablet disposal Printing Shadow IT News Microsoft Teams Employees Encryption Distribution IT Management Mobile Security Certification Memes WannaCry Staff A.I. Current Events User Security Cables Profitability Virtual Private Network Windows Server 2008 R2 Reviews Live Streaming Comparison SaaS Vulnerabilities Scams Workers Hard Drives Printers Thank You Regulation Financial Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123