SlideShare a Scribd company logo
“IMPACT OF REMOTE WORK:
NEW THREATS AND
SOLUTIONS”
Seminar
on
IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS
Presented Guided
By By
Preeti.D Dr Dayanand J Sir
(3gn17cs063)
Contents
• Introduction
• But why are remote workers a target for cyber attackers?
• Weaponised artificial intelligence (AI)
• Social media Attack
• Data Privacy
• Few suggestions based on the survey responses.
• Conclusion
Introduction
• Employees working from home face a new world of workplace challenges. With childcare facilities
mostly closed, many are juggling crying babies or barking dogs, all while tending to job
responsibilities.
• Governments are reconsidering ways to ensure that their countries are stable by developing and
enforcing new economic plans.
• Nevertheless, while the world is focused on the health and economic threats posed by COVID-19,
cybercriminals around the world undoubtedly are capitalizing on this crisis.
• Insider threats can stem from either “negligent insiders” – which according to Proof point is the
most common and accounts for 62 percent – or from malicious insiders, who intentionally steal
data or company secrets.
But why are remote workers a target for cyber attackers?
• Cybercriminals are aware that a lot of businesses were thrown in the deep end with the
pandemic. Businesses weren’t set up for remote working, and therefore didn’t have the
right security protocols in place.
• In March 2020, when most businesses started working remotely, global organizations saw
a 48% spike in ransom ware attacks. These attacks are often in the form of phishing,
either by text, instant messaging, email, and third-party applications.
• Recently, Microsoft has released a study on COVID-19’s effect on cybersecurity They
surveyed nearly 800 business leaders from companies with more than 500 employees
across the UK, US, Germany, and India to better understand how the pandemic is
affecting the cybersecurity industry, including implications on budget and the long-term
effects on the IT landscape.
• At the start of quarantine, Security and IT teams were tasked with
providing secure remote access to all company resources, apps, and data. In order to
successfully allow employees to work from home, there were several technology
investments that needed to be made. According to Microsoft’s study, the top
5 cybersecurity investments since the beginning of the pandemic include multi-factor
authentication (MFA), endpoint device protections, anti-phishing tools, VPN, and end-
user security education.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
Weaponised Artificial Intelligence
• Hackers are using their own automation to attack business networks and
systems from those working remotely.
• To prevent this happening, businesses need to use endpoint security
systems – which so far, only 46.9% of businesses with remote employees
are using. So, in 2021, we expect remote workers to become more
accustomed with endpoint cyber security systems.
Why are they targeting social media platforms?
• Most social media platforms provide poor authentication processes and
little verification in order to access accounts, meaning that social media
attacks are easier than you might think.
• The URL leads to a malicious website that collects personal information
and credentials in order to compromise multi-factor authentication
solutions
Data Privacy
• As we all know, businesses create, collect and store a lot of data, and these digital
footprints are only getting bigger year on year. Data is now one of the most valuable
assets in the world, cited as the new oil.
• If you’re thinking about getting a VPN, getting it from a trusted provider should be your
top priority. There are likely to be other trends in cyber security that will rear their heads
as 2021 progress.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
• Router Configuration
The security of your home network begins with properly configuring your router. A
trivial step such as changing the password of your router’s backend from the default
password can go a long way in preventing it from being hacked.
• Updated Software
This holds true for software in general and security tools in particular. Most rolled out
updates cover the vulnerable aspects of security, as and when weaknesses are identified.
This holds equally true for software that pertain to productivity or security.
• Regular Backups
While organizations have an elaborate plan for backing up data regularly, you also need
to start doing that for your important data. Ideally, there should at least be two backups that
are isolated from your officially issued device and home network itself.
• Suspicious Emails
This is emerging as a major problem for organizations. You need to be extra vigilant
about suspicious emails that at first glance, may seem like an official communique. Avoid
clicking on suspicious links embedded within emails, asking you to do certain things.
• File Sharing Practices
A file that’s of routine nature to you may be a valuable intellectual property for a cyber
thief. So, you must avoid sharing files over your home network when using social media
platforms or insecure collaborative tools.
• Virtual Meeting Software
The demand and use of virtual meeting and collaborative solutions has skyrocketed
due to the present circumstances. By following the simple security guidelines issued by
these software platforms, you can keep your home network and PC safe from many threats
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
Conclusion
Remote work is a reality that we all will have to cope with. The regular use
of our home networks is part of this new work paradigm. While we can
never achieve enterprise grade protection at our homes, we can surely avoid
and mitigate most threats.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

More Related Content

PPTX
INFINITY Presentation
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PDF
Basics of Cyber Security
PPTX
Employee Security Awareness Training
PPT
Disaster Recovery Plan for IT
PPT
Computer viruses
PPTX
Cyber security
INFINITY Presentation
“AI techniques in cyber-security applications”. Flammini lnu susec19
Malware and Anti-Malware Seminar by Benny Czarny
Basics of Cyber Security
Employee Security Awareness Training
Disaster Recovery Plan for IT
Computer viruses
Cyber security

What's hot (20)

PPTX
Information Technology Disaster Planning
PDF
Information Security Awareness Training
PPTX
PPTX
Information security awareness - 101
PPTX
Cyber Security
PPTX
Types of Malware (CEH v11)
PPTX
Cyber security system presentation
PPTX
Cyber security by Anushka Jha
PPTX
Career in cyber security
PPTX
trojan horse- malware(virus)
PPTX
Next word Prediction
PPT
Computer virus
PDF
Building an Intelligence-Driven Security Operations Center
 
PPTX
Anti virus
PDF
1. introduction to cyber security
PDF
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
PDF
Strategies for Managing OT Cybersecurity Risk
PPTX
Network scanning
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cyber security
Information Technology Disaster Planning
Information Security Awareness Training
Information security awareness - 101
Cyber Security
Types of Malware (CEH v11)
Cyber security system presentation
Cyber security by Anushka Jha
Career in cyber security
trojan horse- malware(virus)
Next word Prediction
Computer virus
Building an Intelligence-Driven Security Operations Center
 
Anti virus
1. introduction to cyber security
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Strategies for Managing OT Cybersecurity Risk
Network scanning
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber security
Ad

Similar to IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS (20)

PDF
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
PDF
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
PPTX
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
PPTX
CyberSecurity Services and Why Cybersecurity is required
DOCX
What you need to know about cyber security
PPTX
Module 8 - External Crisis – Changing Technology.pptx
PPTX
Cyber Security PPT.pptx
PPTX
Best Security Practices for a Web Application
PPTX
Cyber Security PPT.pptx
PDF
Securing Your Intellectual Property: Preventing Business IP Leaks
PPTX
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PPTX
Security Minded - Ransomware Awareness
PPTX
Computing Security In CloudComputing.pptx
PDF
The top cybersecurity challenges post-lockdow
PPTX
Cyber Security PPT.pptx
PDF
InformationSecurity_11141
PDF
Enhancing Cybersecurity in Remote Work-3.pdf
PDF
Cyber Security The Essential Guide to Keeping Your Data Safe.pdf
PDF
Cybersecurity
PPTX
Cysec.pptx
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
CyberSecurity Services and Why Cybersecurity is required
What you need to know about cyber security
Module 8 - External Crisis – Changing Technology.pptx
Cyber Security PPT.pptx
Best Security Practices for a Web Application
Cyber Security PPT.pptx
Securing Your Intellectual Property: Preventing Business IP Leaks
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
Security Minded - Ransomware Awareness
Computing Security In CloudComputing.pptx
The top cybersecurity challenges post-lockdow
Cyber Security PPT.pptx
InformationSecurity_11141
Enhancing Cybersecurity in Remote Work-3.pdf
Cyber Security The Essential Guide to Keeping Your Data Safe.pdf
Cybersecurity
Cysec.pptx
Ad

Recently uploaded (20)

PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
additive manufacturing of ss316l using mig welding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Lecture Notes Electrical Wiring System Components
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Structs to JSON How Go Powers REST APIs.pdf
Construction Project Organization Group 2.pptx
UNIT 4 Total Quality Management .pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Digital Logic Computer Design lecture notes
web development for engineering and engineering
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Foundation to blockchain - A guide to Blockchain Tech
additive manufacturing of ss316l using mig welding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CH1 Production IntroductoryConcepts.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
OOP with Java - Java Introduction (Basics)
CYBER-CRIMES AND SECURITY A guide to understanding
Lecture Notes Electrical Wiring System Components

IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS

  • 1. “IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS”
  • 2. Seminar on IMPACT OF REMOTE WORK: NEW THREATS AND SOLUTIONS Presented Guided By By Preeti.D Dr Dayanand J Sir (3gn17cs063)
  • 3. Contents • Introduction • But why are remote workers a target for cyber attackers? • Weaponised artificial intelligence (AI) • Social media Attack • Data Privacy • Few suggestions based on the survey responses. • Conclusion
  • 4. Introduction • Employees working from home face a new world of workplace challenges. With childcare facilities mostly closed, many are juggling crying babies or barking dogs, all while tending to job responsibilities. • Governments are reconsidering ways to ensure that their countries are stable by developing and enforcing new economic plans. • Nevertheless, while the world is focused on the health and economic threats posed by COVID-19, cybercriminals around the world undoubtedly are capitalizing on this crisis. • Insider threats can stem from either “negligent insiders” – which according to Proof point is the most common and accounts for 62 percent – or from malicious insiders, who intentionally steal data or company secrets.
  • 5. But why are remote workers a target for cyber attackers? • Cybercriminals are aware that a lot of businesses were thrown in the deep end with the pandemic. Businesses weren’t set up for remote working, and therefore didn’t have the right security protocols in place. • In March 2020, when most businesses started working remotely, global organizations saw a 48% spike in ransom ware attacks. These attacks are often in the form of phishing, either by text, instant messaging, email, and third-party applications.
  • 6. • Recently, Microsoft has released a study on COVID-19’s effect on cybersecurity They surveyed nearly 800 business leaders from companies with more than 500 employees across the UK, US, Germany, and India to better understand how the pandemic is affecting the cybersecurity industry, including implications on budget and the long-term effects on the IT landscape. • At the start of quarantine, Security and IT teams were tasked with providing secure remote access to all company resources, apps, and data. In order to successfully allow employees to work from home, there were several technology investments that needed to be made. According to Microsoft’s study, the top 5 cybersecurity investments since the beginning of the pandemic include multi-factor authentication (MFA), endpoint device protections, anti-phishing tools, VPN, and end- user security education.
  • 9. Weaponised Artificial Intelligence • Hackers are using their own automation to attack business networks and systems from those working remotely. • To prevent this happening, businesses need to use endpoint security systems – which so far, only 46.9% of businesses with remote employees are using. So, in 2021, we expect remote workers to become more accustomed with endpoint cyber security systems.
  • 10. Why are they targeting social media platforms? • Most social media platforms provide poor authentication processes and little verification in order to access accounts, meaning that social media attacks are easier than you might think. • The URL leads to a malicious website that collects personal information and credentials in order to compromise multi-factor authentication solutions
  • 11. Data Privacy • As we all know, businesses create, collect and store a lot of data, and these digital footprints are only getting bigger year on year. Data is now one of the most valuable assets in the world, cited as the new oil. • If you’re thinking about getting a VPN, getting it from a trusted provider should be your top priority. There are likely to be other trends in cyber security that will rear their heads as 2021 progress.
  • 15. • Router Configuration The security of your home network begins with properly configuring your router. A trivial step such as changing the password of your router’s backend from the default password can go a long way in preventing it from being hacked. • Updated Software This holds true for software in general and security tools in particular. Most rolled out updates cover the vulnerable aspects of security, as and when weaknesses are identified. This holds equally true for software that pertain to productivity or security.
  • 16. • Regular Backups While organizations have an elaborate plan for backing up data regularly, you also need to start doing that for your important data. Ideally, there should at least be two backups that are isolated from your officially issued device and home network itself. • Suspicious Emails This is emerging as a major problem for organizations. You need to be extra vigilant about suspicious emails that at first glance, may seem like an official communique. Avoid clicking on suspicious links embedded within emails, asking you to do certain things.
  • 17. • File Sharing Practices A file that’s of routine nature to you may be a valuable intellectual property for a cyber thief. So, you must avoid sharing files over your home network when using social media platforms or insecure collaborative tools. • Virtual Meeting Software The demand and use of virtual meeting and collaborative solutions has skyrocketed due to the present circumstances. By following the simple security guidelines issued by these software platforms, you can keep your home network and PC safe from many threats
  • 20. Conclusion Remote work is a reality that we all will have to cope with. The regular use of our home networks is part of this new work paradigm. While we can never achieve enterprise grade protection at our homes, we can surely avoid and mitigate most threats.