NEW DELHI: With millions of now accessing work data on home networks and personal devices, organisations are more vulnerable than ever before to cyber crimes.
Humans and poor cyber practices are the weakest links, having often led to major cyber attacks. Here are a few simple rules that one needs to keep in mind while accessing work information at home.
Avoid unauthorised software, hardware Around 47% of security professionals involved in a global survey by Check Point Software, in April, found remote workers using shadow IT solutions while working from home.
Shadow IT refers to hardware or software which are used by employees without the authorisation of the company’s IT department.