GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

View: The implications of large-scale remote working and fraud risk management

globalresearchsyndicate by globalresearchsyndicate
December 5, 2020
in Data Collection
0
View: The implications of large-scale remote working and fraud risk management
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

The relatively new work-from-home arrangement has exposed organisations to a series of cybersecurity threats and risks. Corporate data can be accessed (via hacking and other means) from laptops and home PCs that may not have the same level of security as in-office setups and, hence, are likely to be more vulnerable to cybercrime.

According to a leading research, 71 percent of technology teams globally reported increased data theft risk, leakage, and breaches brought on by work-from-home. Since the lockdown, the world has observed increased rates of phishing attacks and malicious websites.

A common risk in the work-from-home scenario is that apart from official communication apps installed on endpoint devices, employees have started opting for alternate mediums/channels including web-based collaboration platforms and mobile phone internet calling apps for official communication. These alternate channels of communication, if not aptly governed by an organisation’s IT policy, pose the risk of exposed official communication to external attacks.

Organisations tend to have data protection and cyber security policies in place for employees who are virtually connected to the office network. However, when employees use other networks (home networks, public WiFi networks, etc) for work purposes, they go beyond the perimeter of protection offered by the company’s policies and tools.

Further, within office premises, the I.T. team can configure the network access, WIFI, firewall rules, and Data Loss Prevention (DLP) checks so that any non-compliance can be red flagged immediately and the risk of data loss or a possible attack can be mitigated at an early stage. However, in a home or public environment, this may be challenging.

Firewall configuration in a home environment versus an office environment can be different as the purpose of internet access is different.

Company-provided assets tend to come with special configurations to ensure data privacy and the ability to recover data if the system crashes. Company-provided assets also have encryption on their laptops to ensure that only the person who has the right and credentials to access the system will be able to login.

Beyond infrastructure-related challenges, remote working has also exposed the limited knowledge of data privacy and cybercrime amongst employees. On-the-job trainings need to be provided to employees at large on how to identify suspicious emails, access official data over the cloud using multi-factor authentication, and how to backup data in a secured manner. Some other considerations include:

  • Being cautious with files received via email from unknown senders, especially if they prompt for a certain action you would not usually do (such as changing an office account password, etc.).
  • Ensuring authenticity of sources to carry out transactions in one’s personal life. Ideally one should avoid clicking on promotional links in emails from unknown sources, and instead, search or filter for goods and services on authentic retailer websites with positive user reviews.
  • Using different passwords for different applications and accounts accessed. Most people tend to use the same password for accessing multiple portals and transacting for ease of remembering them. But should this password be hacked, the hacker can access all other platforms and compromise the user’s digital identity.

Note: The authors of the article are Jayant Saran, Partner, Forensic – Financial Advisory, Deloitte India; Sachin Yadav – Director, Deloitte India; Rahul Vallicha – Manager, Deloitte India, and Prachee Ratnaparkhi – Assistant Manager, Deloitte India.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Consumer Demand for Eco-friendly Products Set to Boost the Prospects of the Ball Grid Array (BGA) Packaging Market 2016 – 2026 – Cole of Duty

China ECG Monitoring Equipment Market Research Report Analysis 2020-2025 – Cheshire Media

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com