{"id":2376,"date":"2020-04-13T04:07:21","date_gmt":"2020-04-13T01:07:21","guid":{"rendered":"http:\/\/kusuaks7\/?p=1981"},"modified":"2023-12-18T14:37:14","modified_gmt":"2023-12-18T14:37:14","slug":"future-of-work-covid-19-reveals-cybersecurity-threats-in-digital-transformation-efforts","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/future-of-work\/future-of-work-covid-19-reveals-cybersecurity-threats-in-digital-transformation-efforts\/","title":{"rendered":"Future Of Work: COVID-19 Reveals Cybersecurity Threats In Digital Transformation Efforts"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2376\" class=\"elementor elementor-2376\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-45902057 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45902057\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a01e543\" data-id=\"5a01e543\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50dd28cf elementor-widget elementor-widget-text-editor\" data-id=\"50dd28cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\">This article was originally published in <a href=\"https:\/\/allwork.space\/2020\/04\/future-of-work-covid-19-reveals-cybersecurity-threats-in-digital-transformation-efforts\/\" rel=\"noopener\">Allwork.Space<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4f2840 elementor-widget elementor-widget-image\" data-id=\"b4f2840\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/Home-351x250-1.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d12587 elementor-widget elementor-widget-text-editor\" data-id=\"8d12587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"background: #eeeeee; border: 1px solid #cccccc; padding: 5px 10px; text-align: center;\">Cybersecurity is as much an IT issue as it is an HR issue. As more people work from home due to the COVID-19 pandemic, organizations need to make sure that they are training employees on digital security and providing them with access to the right tools and resources to protect their devices and data.<\/div>\n<ul>\n \t<li><strong>The coronavirus outbreak forced many organizations to implement work from home policies immediately.\u00a0<\/strong><\/li>\n \t<li><strong>The move has revealed a serious gap in digital transformation preparedness, particularly as it relates to cybersecurity.\u00a0<\/strong><\/li>\n \t<li><strong>Cybersecurity is as much an IT issue as it is an HR issue; organizations need to ensure that they have the right infrastructure in place, but also that they have and enforce the right policies and processes to protect their employees and important data.\u00a0<\/strong><\/li>\n<\/ul>\n<div align=\"center\">\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3210cce elementor-widget elementor-widget-text-editor\" data-id=\"3210cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<hr align=\"center\" size=\"2\" width=\"100%\" \/>\n\n<\/div>\nAs people increasingly work from home in the hopes of stopping the spread of COVID-19, organizations have been met with the challenge to embrace and implement digital tools in little to no time.\n\nThe global experiment to work remotely has revealed that few organizations have been working on their digital transformation preparedness. And this has come at a high price.\n\nCyber attacks have been on the rise as more people work from home. A worrying trend, as organizations have previously cited security\u2019s role in digital transformation as a potential risk. In fact, a\u00a0<a href=\"https:\/\/www.prophet.com\/wp-content\/uploads\/2019\/03\/state-of-dt-report.pdf?redirectedfrom=gatedpage\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">recent survey\u00a0<\/a>found that cybersecurity was the #2 technology priority in terms of investment for organizations in 2019.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33c7bd1 elementor-widget elementor-widget-text-editor\" data-id=\"33c7bd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile the above is an IT challenge, the reality is that digital transformation efforts have failed, in large part, because leaders forget that digital transformation is also an HR issue.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-568700a elementor-widget elementor-widget-text-editor\" data-id=\"568700a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nIn an\u00a0<a href=\"https:\/\/allwork.space\/2019\/12\/future-of-work-70-of-digital-transformation-efforts-are-failing-heres-why\/\" rel=\"noopener\">interview with Allwork.Space<\/a>, Tony Saldanha stated that digital transformation requires the \u201crewiring of organizational management and individuals to accommodate emerging technologies that are changing the way we work and live.\u201d\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b46a81 elementor-widget elementor-widget-text-editor\" data-id=\"6b46a81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn a\u00a0<a href=\"https:\/\/theconversation.com\/working-from-home-during-the-coronavirus-pandemic-creates-new-cybersecurity-threats-134954\" target=\"_blank\" rel=\"noopener noreferrer\">recent article Aaron Mauro<\/a>, Assistant Professor of Digital Media at Brock University, argues that:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db80a7c elementor-widget elementor-widget-text-editor\" data-id=\"db80a7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n\u201cCybersecurity is a human problem: the person at the screen or keyboard is always the weakest point in any technical system. Attackers will use a set of techniques \u2014 broadly described as social engineering \u2014 to trick us into divulging sensitive information.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb6e54b elementor-widget elementor-widget-text-editor\" data-id=\"eb6e54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn other words, cybersecurity attacks can be prevented in two ways:\n<ul>\n \t<li>By ensuring your organization has the right infrastructure, tools, and processes in place to protect employees and data.<\/li>\n \t<li>By training employees on how to use emerging technologies, how to follow processes, and teaching them basic cybersecurity housekeeping skills.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74387e8 elementor-widget elementor-widget-text-editor\" data-id=\"74387e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile the coronavirus outbreak didn\u2019t give companies much time to set up your IT infrastructure to best support work from home practices, organizations should take the time to walk employees through how to set up a secure home network, how to identify suspicious sites, and how to protect company\/client data while working from home.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed70dee elementor-widget elementor-widget-text-editor\" data-id=\"ed70dee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe issue of cybersecurity becomes even much more of a challenge when organizations are not able to provide employees with their own work device and, instead, encourage workers to use their own personal devices.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e85a54 elementor-widget elementor-widget-heading\" data-id=\"3e85a54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Cybersecurity Tips for Companies and Employees<\/strong><\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f69039 elementor-widget elementor-widget-heading\" data-id=\"1f69039\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>For Companies<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2d907e elementor-widget elementor-widget-text-editor\" data-id=\"d2d907e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>Provide workers with company owned devices.<\/li>\n \t<li>Provide workers with access to a VPN.<\/li>\n \t<li>Have strict processes in place on how to log in to the company network, how to share information with stakeholders, and what types of networks employees are allowed to use.<\/li>\n \t<li>Provide easy to digest cybersecurity information to all remote employees.<\/li>\n \t<li>Create and enforce password policies (using an uppercase letter, using numbers, using symbols, minimum length, etc.). Consider encouraging people to change their passwords regularly.<\/li>\n \t<li>Provide online security training, even if it has to be done virtually.<\/li>\n \t<li>Consider implementing two-factor authentication when possible.<\/li>\n \t<li>Ensure that company emails have a robust spam filter setup, this will decrease the possibility of an employee falling victim to a phishing attack.<\/li>\n \t<li>Remind employees to keep all software and remote collaboration tools updated.<\/li>\n \t<li>Create a quick response guideline should anyone fall prey to a cybersecurity attack.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06f6b9a elementor-widget elementor-widget-heading\" data-id=\"06f6b9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>For Employees<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e0f73 elementor-widget elementor-widget-text-editor\" data-id=\"d2e0f73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>Ensure your home network is secure.<\/li>\n \t<li>Turn off your Bluetooth, particularly in public places and when there\u2019s no need for it.<\/li>\n \t<li>Double-check the sender of emails, particularly if they\u2019re asking you to download anything or click on a link.<\/li>\n \t<li>Use a VPN.<\/li>\n \t<li>Ensure you\u2019ve installed and updated any antivirus software.<\/li>\n \t<li>Update any software, platform, and application you use for work.<\/li>\n \t<li>Encrypt and password protect company files that you need to send. If you need help, reach out to your company\u2019s IT team.<\/li>\n \t<li>Inform your IT team immediately if your device has been compromised or if you suspect you\u2019ve been a victim to a cyber attack.<\/li>\n \t<li>Install trustworthy anti-malware software on your device.<\/li>\n \t<li>Use multi-factor authentication.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber attacks have been on the rise as more people work from home. A worrying trend, as organizations have previously cited security&rsquo;s role in digital transformation as a potential risk. Cybersecurity is as much an IT issue as it is an HR issue. As more people work from home due to the COVID-19 pandemic, organizations need to make sure that they are training employees on digital security and providing them with access to the right tools and resources to protect their devices and data.<\/p>\n","protected":false},"author":758,"featured_media":14363,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-post-2.php","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[182],"tags":[108],"ppma_author":[3612],"class_list":["post-2376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-future-of-work","tag-future-of-work"],"authors":[{"term_id":3612,"user_id":758,"is_guest":0,"slug":"cecilia-amador-de-san-jose","display_name":"Cecilia Amador de San Jos\u00e9","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_a1d950c0-42dc-4a8f-80df-fc37265857f5-150x150.jpg","user_url":"https:\/\/allwork.space\/","last_name":"Amador de San","first_name":"Cecilia","job_title":"","description":"Cecilia Amador de San Jos\u00e9 is Senior Associate Editor at Allwork.Space."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/758"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2376"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2376\/revisions"}],"predecessor-version":[{"id":35024,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2376\/revisions\/35024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/14363"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2376"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}