Saturday, May 21, 2022
Techiexpert.com
No Result
View All Result
  • Login
  • Register
Exclusive Videos
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
No Result
View All Result
TechiExpert
No Result
View All Result

42% of Indian Employees Access Corporate Data on Personal Devices – Trend Micro Report

Srikanth by Srikanth
September 24, 2020
in Tech news
Reading Time: 3 mins read
How Technology Can Improve Employee Relations
9
SHARES
130
VIEWS
Share on FacebookShare on Twitter

Trend Micro Incorporated, the leader in cloud security, today released survey results that show smart home devices and their apps represent a major weak link in the corporate cybersecurity chain as the lines between work and home life increasingly blur.  

Trend Micro’s Head in the Clouds study surveyed more than 13,000 remote workers across 27 countries to find out more about the habits of distributed workforces during the pandemic. It revealed that 42% of workers in India use personal devices to access corporate data, often via services and applications hosted in the cloud. These personal smartphones, tablets and laptops may be less secure than corporate equivalents and exposed to vulnerable IoT apps and gadgets on the home network. Over one third (37%) of remote workers surveyed do not have basic password protection on all personal devices, for example. 

Dr Linda K. Kaye, a cyberpsychology expert said: “The fact that so many remote workers use personal devices for accessing corporate data and services suggests that there may be a lack of awareness about the security risks associated with this. Tailored cybersecurity training which recognises the diversity of different users and their levels of awareness and attitudes around risks would be beneficial to help mitigate any security threats which may derive from these issues.” 

More than half (57%) of Indian remote workers have IoT devices connected to their home network, 12% using lesser-known brands, the study revealed. Many such devices – especially from smaller brands – have well-documented weaknesses such as unpatched firmware vulnerabilities and insecure logins. These could theoretically allow attackers to gain a foothold in the home network, then use unprotected personal devices as a stepping-stone into the corporate networks they’re connected to.  

There’s an additional risk to enterprise networks post-lockdown if malware infections picked up at home are physically brought into the office via unsecured personal devices at organizations with bring-your-own-device (BYOD) practices. 

The research also revealed that 81% of remote workers in India connect corporate laptops to the home network. Although these machines are likely to be better protected than personal devices, there is still a risk to corporate data and systems if users are allowed to install unapproved applications on these devices to access home IoT devices. 

 “IoT has empowered simple devices with computing and connectivity, but not necessarily adequate security capabilities,” said Nilesh Jain, Vice President, Southeast Asia and India, Trend Micro. “They could actually be making hackers’ lives easier by opening backdoors that could compromise corporate networks. This threat is amplified as an age of mass remote work blurs the lines between private and company devices, putting both personal and business data in the firing line. Now more than ever, it is important that individuals take responsibility for their cybersecurity and that organisations continue to educate their employees on best practices.” 

Trend Micro recommends employers ensure their remote workers are compliant with existing corporate security policies, or, if needed, companies should refine these rules to recognise the threat from BYOD practice and IoT devices and applications.  

Companies should also reappraise the security solutions they offer to employees using home networks to access corporate information. Shifting to a cloud-based security model can alleviate many remote working risks in a highly cost-efficient and effective manner. 

Share4Tweet2Share1Pin1

Related Posts

Emirates joins metaverse to get customers
Tech news

Emirates joins metaverse to get customers

Role of Communication Technology on Business
Tech news

Game Changing Tech Developments in the Nursing Field

Forget Bitcoin, Blockchain is the Future
Tech news

A Guide for Beginners to choosing a Bitcoin exchange

Why consider a hardware wallet if you’re new to bitcoin
Tech news

Know in Details about Bitcoin Wallet

VPS Helps Forex Trading
Tech news

Mini guide before Starting Bitcoin trading

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Most Read

  • What is windows modules installer ? How to Enable/Disable

    What is windows modules installer ? How to Enable/Disable

    990 shares
    Share 396 Tweet 248
  • How to make a chatbot using HTML

    151 shares
    Share 60 Tweet 37
  • Are You Disturbed with a Mouse pointer? 5 Tips to hide mouse pointer in chrome

    96 shares
    Share 38 Tweet 24
  • How to Track Someone’s iPhone by Phone Number?

    64 shares
    Share 26 Tweet 16
  • How to draw/create a radius on google maps?

    58 shares
    Share 23 Tweet 14
  • Link Building for SEO: A Brief Beginners’ Guide

    14 shares
    Share 5 Tweet 3

Recent Stories

Twitter’s decentralized Bluesky releases its first codes

Twitter’s decentralized Bluesky releases its first codes
Share4Tweet2Share1Pin1

Emirates joins metaverse to get customers

Emirates joins metaverse to get customers
Share4Tweet3Share1Pin1

Game Changing Tech Developments in the Nursing Field

Role of Communication Technology on Business
Share4Tweet3Share1Pin2

A Guide for Beginners to choosing a Bitcoin exchange

Forget Bitcoin, Blockchain is the Future
Share4Tweet2Share1Pin2
  • Terms of use
  • Privacy Policy
  • About Us
  • Contact us
  • Write For Us
  • Cookie Policy

© 2022 All Rights Reserved

No Result
View All Result
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media

© 2022 All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cookie Law Notice
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT