Cyber Magazine December 2021 | Page 47

CYBER SECURITY

“ Companies also face threats from within their own ranks , internal employees ”

KLAUS JULISCH MANAGING PARTNER RISK ADVISORY , DELOITTE
Deloitte ’ s tips for companies that operate work from home rules branch offices and employees ' homes via an always-on virtual private network .
According to professional services network , Deloitte , working from home is becoming a gateway to new forms of data theft . Poor technological infrastructure and inadequate cyber and data security are hampering the productivity of employees working from home and represents a cyber risk to businesses .
Deloitte ’ s Combating COVID-19 with Resilience report surveyed 1,500 workingage people ( 16 to 64 years ) resident in Switzerland looking at the impact of COVID-19 . Representative sample of ages , genders and regions . Speaking on the results Deloitte ’ s , Klaus Julisch , Managing Partner , Risk Advisory says : “ The external enemy , cyber criminals , is only one of the threats about which security conscious companies should be worried . As this survey shows , companies also face threats from within their own ranks , internal employees .”
• Make staff aware of issues , train them in managing sensitive data and remind them of the company ’ s code of conduct and related rules . Working from home introduces new cyber risks and employees need to be adequately trained in their responsibilities .
• Regularly check that the security measures taken to protect new and tactical IT solutions ( including cloud-based solutions ) deployed are effective . Many solutions were rolled out under enormous time pressure at the beginning of the crisis and IT staff now needs to ensure effectiveness of security controls .
• Step up security monitoring of both devices and users to enable companies to proactively identify and correct mistakes made by users in managing sensitive data .
• Assess capability and capacity to recover from catastrophic cyber attacks effectively , such as a widespread ransomware attack . This includes the capability to get the entire IT infrastructure back up and running as soon as possible after such an event .
• Validate the security effectiveness of your most important service providers , suppliers and sales partners . Weaknesses in the supply chain can cause major cyber and data breaches . cybermagazine . com 47