Remote working has been an inevitability for a lot of people. There is no way to tell what the future holds for remote working but it helps to be prepared, as there is an increased expectation from employees for hybrid working. Benefits such as the freedom to work-from-anywhere in the world, to have the flexibility to work two part-time jobs. Working-from-anywhere was also found to increase motivation in some cases with employees recognising that they were able to live such flexible lives. Perhaps this was also because some interviewees involved in the study also said that because they lived in places that offered no jobs that matched their skills sets and had the flexible work patterns offered.
Aside from the befits of working remotely security concerns are still a significant drawback, as the Harvard Business Review found that this is the case with many top-level executives. To try and adapt to the demand for hybrid working, some companies have overcome this by using ‘perimeter-based security’ this is when machine learning algorithms analyse any out-of-the-ordinary activities on employee devices. Although it seems that there is currently no one-size-fits-all security after the basic security protocols are implemented – such as securing networks, updating devices, using unique passwords, etc.
The cyber security threats that work from anywhere also invoke concerns regarding the security of the internet of things (IoT). Attacks on IoT and IIoT have also led to massive security concerns. while these devices are there to make our lives easier, the use of smart home devices such as light bulbs, doorbells, etc. they also act as a door to our data for whoever is trying to uncover sensitive information like bank details, and company data.
Something as simple as a smart lightbulb can act as an unlocked door to hackers.
While the advance in IoT technology means that there are new ways for a business to create value, these devices are also always connected to the internet which means they are constantly sharing data meaning that there are new opportunities for this information and others to be compromised. IoT devices do not need human interaction to function, they are set up to collect, communicate, analyze, and act on this information. More and more data is now being shared in this manner, the risk is greatly intensified.
An example used by Deloitte to demonstrate this is a garage door opener with an added function of turning off the home alarm system upon entry. While this is very useful for people in a rush, the threat here is that the alarm system has the potential to be deactivated if the garage door is targeted in an attack. Keeping this example in mind and applying it to our other IoT devices, these mounting connections offer an increasing amount of connection points for hackers to gain entry to personal information as well as customer information.