Jasson Casey , CTO of Beyond Identity , on asymmetric secrets and the passwordless authentication
“ Although many companies prioritise cybersecurity protocols before and during gig work , implementing measures after the gig is over is equally essential ”
Jasson Casey , CTO of Beyond Identity , on asymmetric secrets and the passwordless authentication
WATCH NOW
Q . HOW CAN ORGANISATIONS MINIMISE DISRUPTION ?
» Although many companies prioritise cybersecurity protocols before and during gig work , implementing measures after the gig is over is equally essential , if not more crucial . These post-gig measures are critical to maintaining cybersecurity and ensuring that sensitive data remains protected , which might come as a shock to the 33 % of respondents who said that they only sometimes change internal passwords after a gig worker has finished their contract .
Gig workers can also be a source of frustration with regular requests for access . According to the research , 40 % of managers are contacted daily for this reason , with another 35 % being bothered a few times per week . This adds up to 34 minutes per day spent on these tasks , which explains why it might be tempting to forget to change passwords .
“ Although many companies prioritise cybersecurity protocols before and during gig work , implementing measures after the gig is over is equally essential ”
Undoubtedly , COVID-19 and the ongoing evolution of the gig economy have turbocharged the number of contractors . It is clearly a flexible , cost-effective model that has benefits for employers and contractors alike ; however , security must remain paramount at all times . Temporary passwords and restricted access are a limited solution but remember to revoke access and update passwords post-contract . That way , both the employer and gig worker can work safely and securely today and in the future .
cybermagazine . com 17