SlideShare a Scribd company logo
“IMPACT OF REMOTE WORK:
NEW THREATS AND
SOLUTIONS”
Seminar
on
IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS
Presented Guided
By By
Preeti.D Dr Dayanand J Sir
(3gn17cs063)
Contents
• Introduction
• But why are remote workers a target for cyber attackers?
• Weaponised artificial intelligence (AI)
• Social media Attack
• Data Privacy
• Few suggestions based on the survey responses.
• Conclusion
Introduction
• Employees working from home face a new world of workplace challenges. With childcare facilities
mostly closed, many are juggling crying babies or barking dogs, all while tending to job
responsibilities.
• Governments are reconsidering ways to ensure that their countries are stable by developing and
enforcing new economic plans.
• Nevertheless, while the world is focused on the health and economic threats posed by COVID-19,
cybercriminals around the world undoubtedly are capitalizing on this crisis.
• Insider threats can stem from either “negligent insiders” – which according to Proof point is the
most common and accounts for 62 percent – or from malicious insiders, who intentionally steal
data or company secrets.
But why are remote workers a target for cyber attackers?
• Cybercriminals are aware that a lot of businesses were thrown in the deep end with the
pandemic. Businesses weren’t set up for remote working, and therefore didn’t have the
right security protocols in place.
• In March 2020, when most businesses started working remotely, global organizations saw
a 48% spike in ransom ware attacks. These attacks are often in the form of phishing,
either by text, instant messaging, email, and third-party applications.
• Recently, Microsoft has released a study on COVID-19’s effect on cybersecurity They
surveyed nearly 800 business leaders from companies with more than 500 employees
across the UK, US, Germany, and India to better understand how the pandemic is
affecting the cybersecurity industry, including implications on budget and the long-term
effects on the IT landscape.
• At the start of quarantine, Security and IT teams were tasked with
providing secure remote access to all company resources, apps, and data. In order to
successfully allow employees to work from home, there were several technology
investments that needed to be made. According to Microsoft’s study, the top
5 cybersecurity investments since the beginning of the pandemic include multi-factor
authentication (MFA), endpoint device protections, anti-phishing tools, VPN, and end-
user security education.
Weaponised Artificial Intelligence
• Hackers are using their own automation to attack business networks and
systems from those working remotely.
• To prevent this happening, businesses need to use endpoint security
systems – which so far, only 46.9% of businesses with remote employees
are using. So, in 2021, we expect remote workers to become more
accustomed with endpoint cyber security systems.
Why are they targeting social media platforms?
• Most social media platforms provide poor authentication processes and
little verification in order to access accounts, meaning that social media
attacks are easier than you might think.
• The URL leads to a malicious website that collects personal information
and credentials in order to compromise multi-factor authentication
solutions
Data Privacy
• As we all know, businesses create, collect and store a lot of data, and these digital
footprints are only getting bigger year on year. Data is now one of the most valuable
assets in the world, cited as the new oil.
• If you’re thinking about getting a VPN, getting it from a trusted provider should be your
top priority. There are likely to be other trends in cyber security that will rear their heads
as 2021 progress.
• Router Configuration
The security of your home network begins with properly configuring your router. A
trivial step such as changing the password of your router’s backend from the default
password can go a long way in preventing it from being hacked.
• Updated Software
This holds true for software in general and security tools in particular. Most rolled out
updates cover the vulnerable aspects of security, as and when weaknesses are identified.
This holds equally true for software that pertain to productivity or security.
• Regular Backups
While organizations have an elaborate plan for backing up data regularly, you also need
to start doing that for your important data. Ideally, there should at least be two backups that
are isolated from your officially issued device and home network itself.
• Suspicious Emails
This is emerging as a major problem for organizations. You need to be extra vigilant
about suspicious emails that at first glance, may seem like an official communique. Avoid
clicking on suspicious links embedded within emails, asking you to do certain things.
• File Sharing Practices
A file that’s of routine nature to you may be a valuable intellectual property for a cyber
thief. So, you must avoid sharing files over your home network when using social media
platforms or insecure collaborative tools.
• Virtual Meeting Software
The demand and use of virtual meeting and collaborative solutions has skyrocketed
due to the present circumstances. By following the simple security guidelines issued by
these software platforms, you can keep your home network and PC safe from many threats
Conclusion
Remote work is a reality that we all will have to cope with. The regular use
of our home networks is part of this new work paradigm. While we can
never achieve enterprise grade protection at our homes, we can surely avoid
and mitigate most threats.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

More Related Content

What's hot

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

What's hot (20)

Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Remote working and productivity
Remote working and productivity Remote working and productivity
Remote working and productivity
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Similar to IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
caniceconsulting
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 

Similar to IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS (20)

Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 

Recently uploaded

School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
Atif Razi
 

Recently uploaded (20)

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturing
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 

IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

  • 1. “IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS”
  • 2. Seminar on IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS Presented Guided By By Preeti.D Dr Dayanand J Sir (3gn17cs063)
  • 3. Contents • Introduction • But why are remote workers a target for cyber attackers? • Weaponised artificial intelligence (AI) • Social media Attack • Data Privacy • Few suggestions based on the survey responses. • Conclusion
  • 4. Introduction • Employees working from home face a new world of workplace challenges. With childcare facilities mostly closed, many are juggling crying babies or barking dogs, all while tending to job responsibilities. • Governments are reconsidering ways to ensure that their countries are stable by developing and enforcing new economic plans. • Nevertheless, while the world is focused on the health and economic threats posed by COVID-19, cybercriminals around the world undoubtedly are capitalizing on this crisis. • Insider threats can stem from either “negligent insiders” – which according to Proof point is the most common and accounts for 62 percent – or from malicious insiders, who intentionally steal data or company secrets.
  • 5. But why are remote workers a target for cyber attackers? • Cybercriminals are aware that a lot of businesses were thrown in the deep end with the pandemic. Businesses weren’t set up for remote working, and therefore didn’t have the right security protocols in place. • In March 2020, when most businesses started working remotely, global organizations saw a 48% spike in ransom ware attacks. These attacks are often in the form of phishing, either by text, instant messaging, email, and third-party applications.
  • 6. • Recently, Microsoft has released a study on COVID-19’s effect on cybersecurity They surveyed nearly 800 business leaders from companies with more than 500 employees across the UK, US, Germany, and India to better understand how the pandemic is affecting the cybersecurity industry, including implications on budget and the long-term effects on the IT landscape. • At the start of quarantine, Security and IT teams were tasked with providing secure remote access to all company resources, apps, and data. In order to successfully allow employees to work from home, there were several technology investments that needed to be made. According to Microsoft’s study, the top 5 cybersecurity investments since the beginning of the pandemic include multi-factor authentication (MFA), endpoint device protections, anti-phishing tools, VPN, and end- user security education.
  • 7.
  • 8.
  • 9. Weaponised Artificial Intelligence • Hackers are using their own automation to attack business networks and systems from those working remotely. • To prevent this happening, businesses need to use endpoint security systems – which so far, only 46.9% of businesses with remote employees are using. So, in 2021, we expect remote workers to become more accustomed with endpoint cyber security systems.
  • 10. Why are they targeting social media platforms? • Most social media platforms provide poor authentication processes and little verification in order to access accounts, meaning that social media attacks are easier than you might think. • The URL leads to a malicious website that collects personal information and credentials in order to compromise multi-factor authentication solutions
  • 11. Data Privacy • As we all know, businesses create, collect and store a lot of data, and these digital footprints are only getting bigger year on year. Data is now one of the most valuable assets in the world, cited as the new oil. • If you’re thinking about getting a VPN, getting it from a trusted provider should be your top priority. There are likely to be other trends in cyber security that will rear their heads as 2021 progress.
  • 12.
  • 13.
  • 14.
  • 15. • Router Configuration The security of your home network begins with properly configuring your router. A trivial step such as changing the password of your router’s backend from the default password can go a long way in preventing it from being hacked. • Updated Software This holds true for software in general and security tools in particular. Most rolled out updates cover the vulnerable aspects of security, as and when weaknesses are identified. This holds equally true for software that pertain to productivity or security.
  • 16. • Regular Backups While organizations have an elaborate plan for backing up data regularly, you also need to start doing that for your important data. Ideally, there should at least be two backups that are isolated from your officially issued device and home network itself. • Suspicious Emails This is emerging as a major problem for organizations. You need to be extra vigilant about suspicious emails that at first glance, may seem like an official communique. Avoid clicking on suspicious links embedded within emails, asking you to do certain things.
  • 17. • File Sharing Practices A file that’s of routine nature to you may be a valuable intellectual property for a cyber thief. So, you must avoid sharing files over your home network when using social media platforms or insecure collaborative tools. • Virtual Meeting Software The demand and use of virtual meeting and collaborative solutions has skyrocketed due to the present circumstances. By following the simple security guidelines issued by these software platforms, you can keep your home network and PC safe from many threats
  • 18.
  • 19.
  • 20. Conclusion Remote work is a reality that we all will have to cope with. The regular use of our home networks is part of this new work paradigm. While we can never achieve enterprise grade protection at our homes, we can surely avoid and mitigate most threats.