{"id":181,"date":"2020-06-12T12:49:59","date_gmt":"2020-06-12T12:49:59","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=181"},"modified":"2020-06-26T12:50:40","modified_gmt":"2020-06-26T12:50:40","slug":"increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/","title":{"rendered":"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19"},"content":{"rendered":"<p>Fifty-six (56) percent of employees are using their personal computers as their company\u2019s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec. In addition, nearly 25% of employees working from home don\u2019t know what security protocols are in place on their device and more than 1-in-4 have frequent or more issues with spotty WiFi limiting antivirus efficacy.<\/p>\n<p>Morphisec&#8217;s WFH Employee Cybersecurity Threat Index was based on a survey of more than 800 traditional office workers from across the U.S. These employees self-reported as recently transitioning to working remotely during their company\u2019s response to the COVID-19 pandemic. Although the trend toward remote work was already in progress when COVID-19 struck, it accelerated the transition far faster than anyone anticipated. Due to this, IT and security teams had to scramble in their response to the crisis, and the inaugural threat index spotlights the resulting cybersecurity gaps and vulnerabilities reported by employees.<\/p>\n<p>The American workforce is now reliant on at-home WiFi networks and non-hardened work devices, says the report, and without reliable connectivity, employees may not be getting the protection they need. Antivirus and detection tools need a constant network connection to remain effective at blocking attacks. Non-hardened laptops or other endpoint devices can also pose a significant risk to enterprise network security. Research from earlier this year by Morphisec and Ponemon Institute found the average cost of a successful endpoint attack was $8.9 million in 2019.<\/p>\n<p>Furthermore, attack surfaces have expanded during the crisis through employee reliance on collaboration apps. These tools are increasingly in the crosshairs of malicious parties and have less than adequate patching protocols. In fact, vulnerabilities have forced organizations such as Google, SpaceX, and NASA to actually ban employee use of such applications to reduce their risk of more sophisticated breaches. Morphisec Labs researchers discovered one such flaw in the Zoom application in April that enabled threat actors to record Zoom sessions without the participants\u2019 knowledge.<\/p>\n<p>Source: Security Magazine<\/p>\n<p><a href=\"https:\/\/www.securitymagazine.com\/articles\/92571-increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fifty-six (56) percent of employees are using their personal computers as their company\u2019s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec. In addition, nearly 25% of employees working from home don\u2019t know what security protocols are in place on their device and more than 1-in-4 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":130,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19 - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19 - Community\" \/>\n<meta property=\"og:description\" content=\"Fifty-six (56) percent of employees are using their personal computers as their company\u2019s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec. In addition, nearly 25% of employees working from home don\u2019t know what security protocols are in place on their device and more than 1-in-4 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-12T12:49:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-26T12:50:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/\",\"name\":\"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19 - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg\",\"datePublished\":\"2020-06-12T12:49:59+00:00\",\"dateModified\":\"2020-06-26T12:50:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19 - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/","og_locale":"en_US","og_type":"article","og_title":"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19 - Community","og_description":"Fifty-six (56) percent of employees are using their personal computers as their company\u2019s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec. In addition, nearly 25% of employees working from home don\u2019t know what security protocols are in place on their device and more than 1-in-4 [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-06-12T12:49:59+00:00","article_modified_time":"2020-06-26T12:50:40+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/","name":"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19 - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg","datePublished":"2020-06-12T12:49:59+00:00","dateModified":"2020-06-26T12:50:40+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/office-working-app-computer-97077.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/increasing-cybersecurity-gaps-and-vulnerabilities-due-to-remote-work-during-covid-19\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=181"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/181\/revisions"}],"predecessor-version":[{"id":182,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/181\/revisions\/182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/130"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}