Home office: gold mine for cyber criminals

Cyber ​​criminals home office

Share post

“Until we fully adapt to the new normal of working from home, hackers will use the pandemic to their advantage. To do this, they try to manipulate employees in such a way that they carry out safety-critical actions.” Some expert opinions from F-Secure.

Because of the pandemic, home office has become part of everyday life for many. In addition, large parts of the workforce are currently being increasingly encouraged to work from home if at all possible. However, the new situation poses a challenge for data security in companies and at the same time increases the risk of falling victim to phishing.

The new way of working and communicating suddenly forced companies to offer alternative communication channels, regardless of whether they were ready or not. Accordingly, we are already seeing an increase in ransomware attacks this year. After all, the new way of working increases the target area for many companies, not only on a technical level, but also on a social level.

Working from home can result in phishing

Hastily set up remote access for employees has given cyber criminals a playground to gain access to internal networks. In addition, the elimination of the familiar work structure also plays an important role.

Do you currently know all of your colleagues? If not, phishing or other cyberattacks are more likely to be a victim of phishing. Because if you used to get a call from someone posing as IT support, you knew it was a call from an unauthorized person. After all, tech support was a few desks away. So you could easily check that it wasn't him. Now without the personal interaction, do you know for sure whether a person is your new colleague or another phishing attempt?

The general uncertainty will grow in the future as the work processes continue to change rapidly. In other words, any change in the current status quo is an opportunity for hackers. Vic Harkness, Security Advisor, F-Secure Consulting.

  • Employees are asked to return to the office? Click on this link and fill in your personal details and let us know which days you will be present.
  • Can't go back to the office? We are updating the remote access for the home office, please install this new tool.

Weak points in IT security

In 2021 we still expect the pandemic to have an impact on our lives, our companies and our society. The consequences will change over the course of the year, especially with the availability of vaccines. Nonetheless, many companies seem to want to retain some of the home office processes that were introduced quickly in the first days of the pandemic. However, the introduction of new processes and technologies under these conditions is rarely good for data security. In any case, it is important to know that cyber criminals will continue to look for ways to exploit weaknesses in companies' IT security. Greetings from phishing and the distribution of harmful content. As a result, companies need to better protect their networks and everything cloud-based to keep their applications and data secure. Teemu Myllykangas, Director, B2B Product Management

Experts for more data security

During the pandemic and thanks to the lockdown with the home office, private and professional life are merging more and more. While email is still a preferred way of delivering malware, others are becoming increasingly popular. Because when private devices (phone, tablet, laptop) are also used for work, hackers suddenly have many more opportunities to cause damage.

However, in the future, I expect more CVEs (industry standards for security vulnerabilities) to be developed and thus more vulnerabilities to be discovered in software, especially for those that are frequently used by consumers (e.g. shopping app, for tracking deliveries). With this in mind, experts in the future will concentrate more on finding security risks in these apps / software and fixing them before they can be exploited by cyber criminals. Calvin Gan, Senior Manager, Tactical Defense Unit

More on this at F-Secure.com

 


Via F-Secure

Nobody has a better insight into real cyberattacks than F-Secure. We bridge the gap between detection and response. To do this, we leverage the unmatched threat expertise of hundreds of the best technical advisors in our industry, data from millions of devices using our award-winning software, and ongoing innovations in artificial intelligence. Leading banks, airlines and corporations trust our commitment to fight the world's most dangerous cyber threats. Together with our network of top channel partners and over 200 service providers, it is our mission to provide all of our customers with tailored, enterprise-grade cybersecurity. F-Secure was founded in 1988 and is listed on NASDAQ OMX Helsinki Ltd.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more