During the pandemic, hackers around the world have been able to rejoice in the emergence of hybrid work. Because as companies have tried to adapt to the hybrid world, several of them have compromised with security, because no requirements have been set for the employee's home network, their own private device, etc.
During the pandemic, hackers around the world have been able to rejoice in the emergence of hybrid work. Because as companies have tried to adapt to the hybrid world, several of them have compromised with security, because no requirements have been set for the employee's home network, their own private device, etc.
But as more Danish companies look into maintaining the possibility of home work, now that the pandemic is no longer critical to society, you as a manager can no longer leave IT security to the side. Instead, you need to think long-term and build security models for your hybrid workplace that properly secure your data.
But it can be nice to know what it is exactly that you need to be aware of when you need to formulate a plan for how to keep your business as safe as possible. That is why we have collected here 4 of the most frequent security threats that can get in the way of your hybrid workplace:
Phishing: Hackers use social engineering to send communications (e.g. via email, chat or SMS) to a person asking them to share sensitive information such as their password or credit card information. Phishing emails are sometimes easy to spot, but during the pandemic hackers have become incredibly skilled at making them as believable as possible.
Testing passwords: Most people have over 100 login credentials, which means that passwords that are easy to remember are most often used. According to Pwned, "password1" has been registered in connection with breaches of data security over 2.3 million times – and I wonder if you also have one of your children's names + year of birth registered as a password in a few places? With that in mind - and with a company's email address format in mind - hackers can try a generic password such as "password123" on each employee, which gives them a very good opportunity to break in.
Credential Reuse: As with password testing, this type of attack relies on people often using the same password across different accounts. If a hacker already has access to a person's account information from a previous security breach (e.g. a social media), the hacker can then test the password on that person's corporate login information.
Ransomware: Er den slags, som du ofte ser på film – men det gør den ikke mindre aktuel. Ransomware er malware, der bruger kryptering til at tage offerets oplysninger eller data som gidsler, indtil der bliver sendt en betaling. Malwaren kører ofte på virksomhedens netværk, når der er opstået et sikkerhedsbrud.
Do you want to be ahead of the hacker?
Most companies need a comprehensive security solution as they transition to a work model that allows more home-based work. Here it is important that all their access points are protected, regardless of where or which device a login comes from.
At Supporters, we take responsibility for your IT security in our full-service outsourcing concept. We are up to the task and ensure that we always have up-to-date experts who follow developments from the hackers.
You may be interested in this news.
Stay up to date with blogs, news and events.
Let go of your worries with unlimited IT support at a fixed price per month
By clicking on "Call me" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.