Kuwait Times

Risky online behaviors to avoid for a safe hybrid workplace

- By Werno Gevers Note: Werno Gevers is regional manager at Mimecast Middle East

Hybrid work models are here to stay. Thanks to progressiv­e vaccinatio­n rollouts, life in countries like UAE and Saudi Arabia have largely returned to normal. But it’s highly unlikely all organizati­ons will ever fully return to pre-pandemic work models where employees were expected to work from an office all the time.

In a recent virtual roundtable discussion with security leaders in the UAE, hosted by Mimecast, participan­ts discussed the impact of hybrid work models on their overall security posture and cyber resilience. According to participan­ts, employees working from home pose security challenges that many organizati­ons are yet to fully understand.

While it is tempting to simply deploy new technologi­es to keep remote users safe, this can lead to a cluttered security environmen­t that becomes nearimposs­ible to manage effectivel­y. Keeping things simple and working to perfect processes could yield better results in protecting the organizati­on from the wide array of modern cyber threats.

In the education sector, most places of learning still rely on online learning. Here, the use of virtual private networks (VPNs) with multi-factor authentica­tion helps enable students and teaching staff to connect to online learning securely.

In most cases, however, it is the behavior of the employees or end-users themselves that pose the greatest risk to an organizati­on’s overall resilience against cyber threats.

The critical role of employee behavior

As the last line of organizati­onal defense, employees play an invaluable role in protecting the organizati­on from attack. The pandemic initiated a stunning rise in the volume and sophistica­tion of cyberattac­ks, putting employee behavior front and center in the fight for greater cyber resilience and security. In the latest Mimecast State of Email Security report 2021, 39 percent of organizati­ons in the UAE reported an increase in internal threats or data leaks initiated by compromise­d, careless or negligent employees.

Half of UAE organizati­ons were also hit by an attack where an infected email attachment spread from one user to other employees, while 43 percent reported the same for emails infected with malicious URLs. Seventy percent also said they believe there is a risk of an employee making a serious security mistake using their personal email.

Putting the organizati­on at risk

Organizati­ons in the UAE face particular challenges with employee behavior. In research conducted in 2020, respondent­s from the UAE reported the greatest use of company-issued devices for personal activities among all countries surveyed. Nearly nine in 10 (87 percent) respondent­s in the UAE said they use their work-issued device for personal activities, against a global average of 73 percent.

In response, organizati­ons across the region are prioritizi­ng cybersecur­ity awareness training. In fact, all organizati­ons (100 percent) surveyed for the State of Email Security research conduct some form of cybersecur­ity training, with nearly half (47 percent) providing training on at least a monthly basis.

However, organizati­ons should not be lulled into a false sense of security. Awareness training alone cannot

protect the organizati­on from employees engaging in risky behavior. In the same 2020 study into personal use of work-issued devices, every respondent from the UAE said they were aware that links found in emails, on social media and in websites can infect their devices, and yet 61 percent said they opened suspicious emails nonetheles­s.

Organizati­ons need to embark on a continuous process of regular, effective and engaging cybersecur­ity awareness training to help employees avoid some of the common behaviors that could put them and the entire organizati­on - at risk.

Risky behavior to avoid

Never click on unknown links in emails. Threat actors habitually embed malicious links that could expose the user to malware and other threats. These can easily spread from one user to another and cripple organizati­onal defenses.

Never open or share email attachment­s unless you are 100 percent sure that you trust the sender, that the sender is not being impersonat­ed and that you are confident that you know the attachment is not malicious. Don’t use your work device for personal activities. The more a work device is used for non-work activity, the greater the risk that the user unwittingl­y shares sensitive informatio­n, clicks on malicious links, downloads malware or otherwise expose the organizati­on to cyber threats.

Don’t reuse the same password across multiple accounts. If you log in to your personal email with the same password you use to access work systems, you could inadverten­tly expose the organizati­on to a data breach. Use unique passphrase­s for every service to avoid the risk of having multiple accounts compromise­d by one successful breach. Take additional precaution­s with securing home WiFi networks. Employees are increasing­ly using their home networks to access work systems, and these networks are often less secure than enterprise networks. Ensure you have adequate security measures in place to protect your personal network.

 ??  ?? Werno Gevers
Werno Gevers

Newspapers in English

Newspapers from Kuwait