• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

IT Pros Share Work Devices with Household

You are here: Home / General Cyber Security News / IT Pros Share Work Devices with Household

New investigation has unveiled that just about a quarter of IT security industry experts share their work units with customers of their home. 

The obtaining comes from the 2021 World-wide IT Security Survey published right now by hardware-encrypted USB push manufacturer Apricorn.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Premium Security 2021

Protect yourself against all threads using AVAST Premium Security. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium.

Get AVAST Premium Security with 60% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Researchers questioned far more than 400 IT security practitioners across North The united states and Europe about their security methods and procedures for the duration of distant operating situations about the previous 12 months.

Sixty % of respondents agreed that COVID-induced remote perform ailments had made details security issues inside of their companies, with 38% noting that facts management throughout the pandemic has been pretty difficult to handle.

The bulk of respondents (75%) reported that they had place COVID-centric cybersecurity insurance policies in position, such as two-factor authentication (48%) and encryption of delicate details (41%). Nevertheless, practically 20% admitted that their operate units had been utilized by other customers of their family. 

Practically half (45%) of respondents experienced authorized the use of personal USB units devoid of company oversight, permitting the employee determine which system to use, when to use it, and for what details. 

Practically 70% reported that they want an encrypted USB policy in their organization, but 40% did not have plans to roll out a company USB method.

Much more than a quarter (27%) of respondents expressed that they had been not worried about dropping information as a result of third-party sellers and have enhanced the range of suppliers with whom they get the job done. 

“The 3rd-party seller results ended up a surprise offered the substantial amount of large-profile 3rd-party breaches in modern yrs,” explained Kurt Markley, US running director, Apricorn. 

“Misplaced have faith in is dangerous. Organizations will have to reinforce their security posture, think about security insurance policies and processes associated to how they handle data, and make policy changes within organizations and in just agreements with associates.”

Virtually 50 percent of respondents (49%) experienced observed that particular person workforce in their business did not look at themselves as targets that attackers could exploit to entry company info. 

Markley reported: “In quite a few conditions, successful attacks goal workforce, so if they are unprepared or untrained, they are a risk.”

He added: “The great importance of developing a lifestyle of security, educating people and suppliers about security tactics, and employing procedures these kinds of as stop-to-conclude encryption can’t be overstated for supporting organizations continue to be safe as their functioning environments keep on to shift.”


Some areas of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «krebs: it’s time for a law that invests in the Krebs: It’s time for a law that invests in the digital infrastructure

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • IT Pros Share Work Devices with Household
  • Krebs: It’s time for a law that invests in the digital infrastructure
  • Consulting Firm Data Breach Impacts MSU
  • Fake Netflix App on Google Play Spreads Malware Via WhatsApp
  • Chemical Weapon Shopping Sends Dark Web User to Prison
  • BCDR buyer’s guide for MSPs
  • Phishing Emails Most Commonly Originate from Eastern Europe
  • Android to Support Rust Programming Language to Prevent Memory Flaws
  • What is cross-site scripting (XSS)?
  • Hackers sell $38 million in gift cards on Russian marketplace

Copyright © TheCyberSecurity.News, All Rights Reserved.