Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Remote Work a Bigger Risk with Certain Employees?

Is Remote Work a Bigger Risk with Certain Employees?

Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.

As it happens, many business owners hold some preconceived notions as to which of their users constitute the biggest risks while working remotely. Let’s turn our attention to some statistics to see if these notions have any merit.

Cybersecurity in the Home Versus in the Office

Before we begin our review, it is important that we start off by acknowledging one thing: your employees probably aren’t used to subscribing to the same cybersecurity standards at home as they do in the office. While there will be exceptions, your team is generally going to be somewhat lax in their at-home security precautions.

This could easily cause remote work to become problematic. Consider it: when working remotely, your team isn’t operating within the protections installed on your business’ network. As a result, they could unwittingly allow in a threat and thereby give it access to whatever data or resources the individual responsible is privy to. Not only does this reinforce the importance of general access permissions, but it also makes it crucial that you encourage your employees to maintain high standards of security whenever and wherever attending to business matters.

According to a survey taken by the National Cyber Security Alliance, personal security standards are a mixed bag in more ways than one. Compiling the responses of 1000 American adults, with the sample split evenly between those aged 18 to 34 and those from 50 to 75 years of age, this survey helped to identify a few differences in behavior between these two cohorts.

The Survey’s Findings

Many of the insights that this survey presented were somewhat predictable. For instance, the younger cohort were more likely to put multi-factor authentication in place, 89 percent of respondents doing so compared to the elder cohort’s 70 percent. Similar numbers came up when it came to whether a user regularly applied software updates—83 percent of the younger group did, while 63 percent of the older group would.

Having said that, many of the data points generated through this survey told a much more two-sided story… one in which security practices were inconsistent across the board. While the younger cohort would more often use MFA, they would also neglect to update their basic security solutions, would connect to public Wi-Fi far more often, and didn’t reinforce their security when working remotely.

So, in this way, every age group can be a risk to cybersecurity while they work remotely… it just comes out in different ways.

How Does This Impact Your Business’ Security?

Here’s the hard truth: assuming that one group of users is inherently more or less secure than the other is a recipe for disaster, whether your team is working remotely or coming into the workplace each day. This means that your business’ security lies in your team’s awareness as a cohesive unit, which in turn means you need to do everything you can to keep them vigilant.

To do so, you need to clearly establish rules and procedures for everyone to follow as they’re working, wherever they happen to be at the time. Giving them different materials and exercises to use and evaluating their preparedness can help keep them accountable, as well as reveal to you where your potential vulnerabilities lie and what you need to do to resolve them.

If you need assistance with securing your team’s cybersecurity, reach out to our team here at Voyage Technology. With our help, your team can be secure whether they’re working in the office or at home. Call 800.618.9844 to find out more today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 14 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Phishing Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware AI Managed Service Users Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Facebook Holiday Automation Covid-19 Gadgets Cloud Computing Training Compliance IT Support Managed Service Provider Outsourced IT Remote Work Server Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Blockchain Bandwidth Windows 10 Vendor Virtualization Wi-Fi Business Technology Mobile Office Data Security Apps Managed Services Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Voice over Internet Protocol Marketing Password HIPAA Managed IT Services How To Applications BDR Computing Physical Security Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Office Tips Analytics Website Augmented Reality Retail Storage Bring Your Own Device Router Big Data 2FA Help Desk Operating System Virtual Private Network Risk Management Computers Healthcare Health Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Firewall Scam Solutions Data loss The Internet of Things Going Green Patch Management Windows 11 Social Save Money Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Excel Cybercrime Customer Service Managed IT Service Display Remote Workers Printer Telephone Paperless Office Infrastructure Outlook Data Privacy Machine Learning Images 101 Money Word Humor Multi-Factor Authentication Mobility Telephone System Cost Management Maintenance Antivirus Sports Mouse Safety Employees Integration Administration Modem User Tip Processor Mobile Security Holidays Robot Settings Data Storage Printing Smart Technology Supply Chain Wireless Content Filtering Video Conferencing IT Management Customer Relationship Management Managed Services Provider Virtual Machines VPN Professional Services YouTube Meetings Saving Time Cryptocurrency Hacking Computer Repair Presentation Downloads iPhone Virtual Desktop Data storage Licensing LiFi Wireless Technology Entertainment Vulnerabilities Electronic Medical Records Trends Supply Chain Management SharePoint Regulations Google Calendar Term Google Apps Halloween Recovery Customer Resource management FinTech Data Analysis Star Wars IT Assessment Lenovo Microsoft Excel IT Maintenance Hard Drives Writing Domains Virtual Reality Gamification Flexibility Staff Value Business Intelligence Social Networking Hacks Server Management Legislation Shortcuts Scary Stories Private Cloud Organization Fileless Malware Digital Security Cameras Smart Devices Superfish Ransmoware Identity Theft Refrigeration Fun Public Speaking Twitter Content Remote Working Wearable Technology Memory Vendors Deep Learning Motherboard Data Breach Lithium-ion battery Comparison Google Play Be Proactive Error Health IT Entrepreneur Directions Videos Assessment Electronic Health Records Permissions Workforce Education Social Engineering Remote Computing Wasting Time Threats Trend Micro Mobile Computing Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Fraud Meta Tablet Undo Search Best Practice Alert Username Managing Costs Amazon eCommerce Managed IT Black Friday SSID Buisness File Sharing Dark Data How To Database Surveillance Legal Virtual Assistant Outsource IT IT solutions Business Growth Media Notifications IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Travel Application Proxy Server Reviews Cortana Tactics Development Techology Hotspot Transportation Small Businesses Google Maps Alt Codes IBM Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Downtime Unified Threat Management Shopping Addiction Unified Threat Management Language Employer/Employee Relationships Outsourcing Hosted Solution Typing Navigation Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Network Congestion Gig Economy Knowledge Service Level Agreement Internet Service Provider Google Drive User Error Computing Infrastructure Teamwork Hiring/Firing Competition Evernote Paperless Regulations Compliance Identity Smart Tech Memes Co-managed IT Point of Sale 5G Bookmark Experience Download Net Neutrality Google Docs Alerts SQL Server Technology Care Unified Communications Bitcoin Network Management Business Communications Running Cable Tech Support User Financial Data History Browsers Smartwatch Connectivity IT Google Wallet Break Fix Scams Monitors Upload Procurement Azure Hybrid Work Cyber security Windows 8 IP Address Multi-Factor Security Tech Human Resources Laptop Websites Social Network Telework CES IoT Communitications Drones Dark Web Cables

Blog Archive