Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

A Recipe for Data Breaches, Says Survey

Researcher by Researcher
April 4, 2023
in Cybersecurity
0
A Recipe for Data Breaches, Says Survey
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext.

Woman in a black blazer holding a smartphone in front of a building with a lot of lighting.
Image: Adobe Stock

Employees might feel more comfortable using personal devices for work and even save the company money in doing so, but there is a costly trade-off: security.

A report released on March 30 by cybersecurity provider SlashNext explored how employees’ use of personal apps and devices can open the door to security threats, revealing that 43% of employees have been targeted with work-related phishing attacks.

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

For SlashNext’s The Mobile BYOD Intelligence Report, the company surveyed 300 individuals about the use of personal devices for work, how employers balance security and employee privacy with the popularity of Bring Your Own Device, and the resulting gaps in cybersecurity. The recipients included security professionals and employees across organizations with more than 1,000 workers in North America.

Jump to:

Reasons why BYOD is increasing

Right off the bat, the survey found that the use of personal devices for work has been increasing. One reason for this is convenience. As more people work remotely or adopt a hybrid approach, employees want to be able to do their jobs from anywhere and at any time, which often requires that they use their own PC or mobile device.

Another reason for BYOD is comfort. People are already familiar with their own devices and apps, which lessens the learning curve involved in using a different, company-issued device.

How employees use personal devices for work

Amid the rise in BYOD, these are the three most common work-related tasks that people perform on their personal devices, according to SlashNext’s survey (Figure A):

  • 66% of the employees use their personal texting apps for work.
  • 59% use their personal and private messaging apps for work.
  • 57% sometimes use their work email for personal reasons.

Figure A

Graph showing the types of risky behaviours that employees engage in with when using their own device at work.
71% of employees store sensitive work passwords on their personal phones, SlashNext found. Image: SlashNext

The survey also revealed that 85% of employers require work-related apps to be installed on their employees’ personal devices.

How BYOD can lead to security threats

The downside here is that this blurring of personal and work devices and use can easily lead to security threats. Among those surveyed:

  • 71% said they store sensitive work passwords on their personal phone, opening the door to compromise.
  • 43% of the employees have been the target of a phishing attack on their personal device.

In response, 95% of the security professionals surveyed said that phishing attacks delivered via private messaging apps are a growing concern.

“Most enterprises support some form of BYOD, which brings a consumer-level hack into the realm of an enterprise being compromised,” said Bud Broomhead, CEO at cyber hygiene firm Viakoo.

“Ensuring that employees are not using personal passwords in their work environment can help to reduce the possibility of compromise, however, the blurred lines between work life and home life are making it easier for cyber criminals to perform exploits aimed at enterprise systems and data.”

How BYOD can lead to control and privacy challenges

The use of BYOD can also trigger control and privacy issues. For instance:

  • Do IT and help desk staff have the freedom and responsibility to enforce company policies on personal devices? If so, how do they make sure those devices are configured and updated to adhere to security best practices?
  • Are there legal and compliance issues involved in storing sensitive work data on personal devices, especially if such devices are ever lost or stolen?

Among the security pros surveyed, 90% said that protecting the personal devices of employees is a top priority. However, only 63% said that they have the right tools to accomplish this. In addition, 89% of them said that they have legal concerns about having access to the private data of employees.

Possible solutions to these BYOD security challenges

With many threats targeting mobile devices, 81% of security pros believe that security and privacy issues can be addressed by giving employees a separate phone just for work. But even with two phones, many employees still use their own device for work tasks, which actually doubles the attack surface for cybercriminals to exploit.

Must-read security coverage

One way to deal with this might be to establish a policy to govern the use of both a work phone and a personal phone.

Security training is often touted as another way to prevent attacks, by teaching employees how to avoid them. However, 98% of security professionals surveyed said that, even with regular training, employees are still vulnerable to phishing attacks and other threats.

Security training is a good starting point, according to Broomhead. But beyond the basic training, employers should have a way to test or audit employees to make sure the instructions they receive are actually being followed. Further, organizations with IoT devices need to keep them on separate networks and ensure that they’re updated with the latest security fixes, Broomhead added.

“The good news is this is not an unfamiliar situation,” Broomhead said. “Enterprise IoT devices typically operate on networks not managed by corporate IT, and the best practices from IoT security directly apply in work from home situations.”



Source link

Tags: breachesDataRecipeSurvey
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
0

Threat actors are exploiting a critical-severity Zyxel flaw in order to add vulnerable devices to a Mirai botnet variant. While...

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
0

Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...

8 best practices for securing your Mac from hackers in 2023

8 best practices for securing your Mac from hackers in 2023

June 1, 2023
0

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and...

ZuoRAT Malware Found Hitting Home Routers

New SeroXen RAT Emerges | Decipher

June 1, 2023
0

Security researchers are tracking a new fileless RAT named SeroXen that has the capability to evade many EDR systems and...

Sentra Raises $30 Million for DSPM Technology

Chrome 114 Released With 18 Security Fixes

May 31, 2023
0

Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved