Intelligent CIO Europe Issue 39 | Page 28

TRENDING being used to access corporate data ? Our controls must also be truly device and location agnostic . It ’ s important to leverage cloud solutions that enable agile working along with good security controls .
“ We mustn ’ t forget about basic hygiene either – for example enabling multi-factor authentication ( MFA ), and ensuring employees know how to create strong passwords . It ’ s no longer easy to just walk down the corridor and speak to someone if there ’ s a security issue , so IT helpdesks should be empowered to use remote management tools where possible to fix issues .”
More than half ( 52 %) of respondents to Infosecurity Europe ’ s poll believe that unsecured personal devices pose the biggest security threat within the remote working environment , followed by unsafe VPN / Wi-Fi connections ( 30 %). Unapproved cloud apps ( 10.6 %) and collaboration tools ( 7.3 %) are seen as relatively low risk .
Nicole Mills continued : “ Security threats have evolved as the pandemic has advanced . Attackers are ready to strike at the weak points that emerge as new ways of working and living continue to affect employees ’ behaviours and mindsets .
“ One particular area we all need to guard against now is the rise of ‘ fearware ’, as criminals seek to trick remote workers with ransomware and phishing scams , often linked to messages about COVID-19 . Training undoubtedly has a major role to play here .” easily-guessed passwords on routers , or don ’ t apply updates to equipment . We ’ ve seen IT and information security functions provide great regular hints and tips for staying secure when working from home , improving awareness and education .
Drawing 6,568 responses , the Infosecurity Europe Twitter poll was conducted during the week of February 8 , 2021 . Infosecurity Europe also interviewed its network of CISOs and analysts to gather their views on the current threat landscape . p
Nicole Mills , Exhibition Director at
Infosecurity Group
“ This can also include support for mental health , as security may well decline if an individual is suffering . There ’ s definitely evidence of the boundaries of responsibility between information security and HR merging – and this is for the better .”
On the other hand , Mark D . Nicholls , CISO at Chime Group , believes organisations should adapt controls to be more data-centric , starting with visibility .
“ We need to know what people are accessing and what they ’ re doing with it .
“ Do we truly know what ’ s going on with an employee ’ s home broadband network and the personal devices
28 INTELLIGENTCIO EUROPE www . intelligentcio . com