Ensuring the successful mitigation of threat as remote working evolves

iStorage CEO, John Michael, considers the ways in which hybrid working is set to change, and the steps HR departments must take to ensure organisational data remains safe.

iStorage CEO, John Michael, considers the ways in which hybrid working is set to change, and the steps HR departments must take to ensure organisational data remains safe.

Data is the most important asset any business has, and they have long been aware of the importance of keeping it safe. Even before everything was connected, diligent employees backed up hard drives and filled CD-Rs with crucial data. Rightly so – keeping multiple copies remains a core tenet of data safety. But when internet connectivity became commonplace, the focus shifted from data integrity to data security. Data stored in the wrong place or left open to outside access could now very easily fall into the wrong hands without a disk going missing – or even, perhaps, any evidence of a breach at all.

As we have moved towards a reliance on cloud storage, more and more data has become readily accessible to those determined to access it. Ransomware, in its various forms, makes data breaches a profitable and subsequently more common occurrence – all while rules and regulations surrounding data management have evolved to make such a breach significantly more damaging to the reputation and finances of an organisation.

New challenges for data
It’s arguable that the transition to the cloud was only a midpoint. We have now reached an explosion of connected data. Propelled by the pandemic, hybrid and remote working has become not just an outlier but the norm for many. 40% of British adults work from home at least once per week[1], and a third of those performing hybrid or remote work would rather resign than return to the office full-time[2]. Remote job postings may be dropping, but out-of-office work is not going anywhere.

Remote employees may be tempted to use personal devices for work purposes, negating any protections which have been applied to certified hardware. They may become relaxed with their attitudes to data storage, leaving sensitive documents on unencrypted and unmonitored drives. They may work on unsecured networks in places where their passwords could be shoulder-surfed, lose critical devices and data while travelling to and from the office, or become so relaxed at home that they may more readily fall for phishing scams.

An intimidating future
The explosion of remote work during the pandemic was an unsurprising boon for attackers. The National Cyber Security Centre reported a 15-fold rise in the number of online scams that it removed in 2022[3] because hackers know that remote employees have the potential to be more vulnerable to attack, and that such attacks may be more difficult to detect from afar. As remote working continues to be commonplace, such threats – and the vectors they can use to infiltrate – are likely to evolve.

Advancements in AI tech will make phishing more convincing, resulting not only in realistic, hard-to-spot email scams, but in voice and video models which more readily trick employees into believing they are speaking to a trusted colleague. AI or not, hackers’ tactics will become more cunning and far more advanced. And it is imperative that we stay ahead of the threats presented by new technologies.

Working practices may soon switch to embrace VR or the metaverse, for example. Identifying a compromised account or a bad actor posing as a colleague in the metaverse is likely to be far more difficult if every participant in a meeting is shrouded behind an avatar – and it’s hard to argue that the exciting, avant-garde nature of the metaverse will not cause workers to let their guard down.

The importance of readiness
The threat of the metaverse may be looming, but nothing, fundamentally, has changed. For all these new challenges, the core tenets of good data management – keeping reliable backups, obfuscating data to prevent it being accessed by third parties and always following best practice – remain the strongest defence. Creating a solid work culture focused on cybersecurity hygiene is the best way to ensure that tomorrow’s threats are easy to manage, even as the way we connect remotely or the threats themselves evolve.

One thing follows another. Installing rigid processes and regular training reminds employees of the potential impact that their actions could have, and helps embed best practice. Building a culture of trust ensures that standards do not slip and helps to inform the kind of security measures that will be required even if employees manage to be meticulously diligent. Well-considered data policies reduce the risk of costly breaches and reveal, without question, that employees need secure, encrypted storage to conduct their duties safely.

Future-proof security
The benefits of encryption are clear. It keeps data private, even if workers use file transfer services to share large files over public networks. Sufficiently secured data renders an intercepted email, a breached cloud drive, an insecure network and even an undetected phishing attempt completely useless to an attacker. An encrypted backup is one with inherent integrity, not only securing against data loss but against infiltration or theft. And for remote employees’ local storage, an encrypted drive makes it confidential by design: the contents of such a drive simply cannot be accessed without the proper credentials.

Encryption helps to stay in line with legislative demands on data storage, and vastly reduces the risk of a data breach. Some storage options even enhance the potential strength of one’s security policies. Encryption locked behind two-factor authentication neutralises leaked passwords. Storage which can be administered remotely can be geofenced to prevent its use outside of an employee’s agreed range, wiped from a distance, or locked permanently if it is lost or an employee has left the organisation.

There’s no sense in waiting for tomorrow’s challenges to reveal themselves, because we know their solution today. 256-bit AES encryption is considered quantum resistant; to break it with brute force would take today’s computers longer than the universe is expected to last, and we know that even tomorrow’s quantum computers will require an incredible level of development to even come close. Encrypted data is safer data – with the right policies surrounding it, your organisation will be as protected as it can be.

Learn more about improving data security: https://istorage-uk.com/

[1] https://www.statista.com/statistics/1207746/coronavirus-working-location-trends-britain/

[2] https://www.theguardian.com/business/2023/mar/15/uk-workers-office-return-linkedin

[3] https://www.theguardian.com/technology/2021/may/10/uk-covid-related-cybercrime-fuels-15-fold-rise-in-scam-takedowns

About iStorage
iStorage is the trusted global leader of award-winning, PIN authenticated, hardware encrypted portable data storage & cloud encryption solutions. iStorage offers the most innovative range of products to securely encrypt, store and protect data to military standards; safeguarding valuable and sensitive data to ensure compliance with stringent regulations and directives such as GDPR, HIPAA, SOX, NRC, GLB and DHS Initiatives. Today, iStorage products are used by government, military, multinational corporations as well as consumers in over 50 countries, with the mantra that encryption is an essential commodity required by all.

    Read more

    Latest News

    Read More

    How to hire and manage employees for Your Arizona LLC

    18 September 2024

    Newsletter

    Receive the latest HR news and strategic content

    Please note, as per the GDPR Legislation, we need to ensure you are ‘Opted In’ to receive updates from ‘theHRDIRECTOR’. We will NEVER sell, rent, share or give away your data to third parties. We only use it to send information about our products and updates within the HR space To see our Privacy Policy – click here

    Latest HR Jobs

    The Interim HR Director will have the opportunity to lead on all aspects of HR as follows:. We are looking for a superb Interim HR

    The Interim HR Director will have the opportunity to lead on all aspects of HR as follows:. We are looking for a superb Interim HR

    The Interim HR Director will have the opportunity to lead on all aspects of HR as follows:. We are looking for a superb Interim HR

    Interim HR Director We are looking for a superb Interim HR Director to join a manufacturing organisation based in Somerset to cover a 7-10 month

    Read the latest digital issue of theHRDIRECTOR for FREE

    Read the latest digital issue of theHRDIRECTOR for FREE