28 July 2020
Working from home, or ‘agile working’ as we term it at TruStack, has become increasingly common over the past few months as companies adapt their working practices to cope with the impact of Covid-19. From the results of businesses we have surveyed (agile working report here), we believe agile working will only increase in future, and so businesses must be well-prepared to deal with the issues this will bring. Arguably the most important of these is security.
It is predicted globally that companies will spend in excess of $137 billion in 2020 to protect against cyber threats, with the highly regarded technology research company Gartner predicting the global cost of security attacks on businesses will be around $3.9 trillion!
Cyber-attacks are no longer conducted just by individuals sitting in bedrooms. State and political sponsored cyber-attacks shape global economies and political landscapes. The skills behind the attacks are increasing, the rewards for those committing the tasks are increasing, which means it is reasonable to predict more volume and more complexity of attacks in future. It is vital businesses protect themselves by ensuring their rolling out of agile working does not compromise their data, which many believe is the most valuable of global commodities.
Home networks tend to be far more open, with so many devices – e.g. smart speakers, internet enabled sound bars, games consoles, smart lights, smart phones, smart TVs – potentially sharing a network and broadband with multiple work devices. All of this increases the possibility of a piece of malware, or ransomware, finding a weakness and exploiting it, potentially allowing it to find and spread in the local network. Remote workers need strong security and those systems need stringent monitoring to protect the business data users operate with.
Businesses need layers of protection – no business can rely on a single product, platform or device to protect its data. There are, however, some key steps to take to give your business the best chance of protecting against cyber-attacks. These include having a quality firewall, implementing a quality antivirus platform for user devices like our Worry Free service, carrying out security patching, having a multi-factor authentication process such as Thales and investing in a robust backup and recovery solution whether that be Veeam, Datto or a service out of our Data Centre.
These are just some of the protection measures that TruStack consults around. Ultimately, businesses must have a security-first mindset, from bottom to top, where protection of data is an absolute priority, as we transition towards a largely agile workforce.