1 / 3

Teleworking Endpoint Exploitation Putting IT Professionals into More Risks

Nearly 67% of the IT professionals are highly concerned with the increased teleworking endpoint mistreatment, a new Prey study reveals.<br>

18706
Download Presentation

Teleworking Endpoint Exploitation Putting IT Professionals into More Risks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Teleworking Endpoint Exploitation Putting IT Professionals into More Risks Nearly 67% of the IT professionals are highly concerned with the increased teleworking endpoint mistreatment, a new Prey study reveals. The recent research study from Prey Software examines the growing remote work challenges brought by the pandemic era. Today, most of the employees are working from home – far from corporate environments and on insecure networks. In many cases, people are using other unsafe devices in their home offices. Given the concerning situation, nearly, 43.13% of professionals will work remotely, even after the pandemic is gone. As a result, around two out of three IT workers are concerned with teleworking endpoint exploitation and device misuses. As Norman Gutiérrez, Cybersecurity Researcher at Prey Software explains –“As the pandemic hit in early 2020, organizations had to cope with the new reality of a remote workforce. Our survey found a whopping 75 percent were unprepared for this rapid shift and that endpoint security had become one of their top priorities.” Also Read: Significant Gap between C-suite Executives and Data Analysts’ Views Regarding BI

  2. Increased remote work brings increased IT challenges As per the study, most workers will function from remote locations for a long and they will join the vast 63% of professionals who are already having some sort of remote working policy implemented even before the pandemic. This has created a vastly expanded remote workforce worldwide. In this modern-age working environment, the surveyed IT professionals are highly concerned about the lack of IT infrastructure – in order to allocate resources to sudden remote workers. This is followed by employees using third-party software, gradually more overwhelmed IT staff, and not having enough systems for all. This lack of IT budget is a critical concern too, and dated infrastructure and IT personnel without the necessary experience. Among the surveyed IT workers, nearly 62% stated that cyber threats have increased after the pandemic began. In fact, more than 50% agreed that the pandemic and remote office has made cybersecurity a greater challenge lately, and another 41% somewhat agreed to it. The study identifies endpoint security as the “bread and butter” of the modern cybersecurity landscape. This is certainly a way to secure remote work devices while maintaining a minimum level of security at the same time – for the data in transit. Undoubtedly, data encryption solutions are highly appreciated too – in order to deliver advanced protection to the static data on all endpoints. Furthermore, remote work must happen in collaboration with cybersecurity education for employees and frequent endpoint checkups. Also Read: Remote Work Trends: Future of Enterprise Hiring in the IT industry Some of the key highlights from the study are – About 67% of the IT professionals surveyed indicated that endpoint misuse developed in some way in their organizations Almost 44% of the respondents are worried that with more liberal BYOD policies, personal devices are being utilized in the workplace – that too without risk assessment. Clearly, IAM (Identity and Access Management) is a necessity for over half of the surveyed companies. In fact, software management sits right in the middle – a necessary error in a remote world. Even the backup and web filtering are in less priority, and this is only relevant to one-third of the surveyed IT professionals.

  3. Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google News Enterprisetalk News. Subscribe to our Newsletter for more updates.

More Related