Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Remote Work a Bigger Risk with Certain Employees?

Is Remote Work a Bigger Risk with Certain Employees?

Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.

As it happens, many business owners hold some preconceived notions as to which of their users constitute the biggest risks while working remotely. Let’s turn our attention to some statistics to see if these notions have any merit.

Cybersecurity in the Home Versus in the Office

Before we begin our review, it is important that we start off by acknowledging one thing: your employees probably aren’t used to subscribing to the same cybersecurity standards at home as they do in the office. While there will be exceptions, your team is generally going to be somewhat lax in their at-home security precautions.

This could easily cause remote work to become problematic. Consider it: when working remotely, your team isn’t operating within the protections installed on your business’ network. As a result, they could unwittingly allow in a threat and thereby give it access to whatever data or resources the individual responsible is privy to. Not only does this reinforce the importance of general access permissions, but it also makes it crucial that you encourage your employees to maintain high standards of security whenever and wherever attending to business matters.

According to a survey taken by the National Cyber Security Alliance, personal security standards are a mixed bag in more ways than one. Compiling the responses of 1000 American adults, with the sample split evenly between those aged 18 to 34 and those from 50 to 75 years of age, this survey helped to identify a few differences in behavior between these two cohorts.

The Survey’s Findings

Many of the insights that this survey presented were somewhat predictable. For instance, the younger cohort were more likely to put multi-factor authentication in place, 89 percent of respondents doing so compared to the elder cohort’s 70 percent. Similar numbers came up when it came to whether a user regularly applied software updates—83 percent of the younger group did, while 63 percent of the older group would.

Having said that, many of the data points generated through this survey told a much more two-sided story… one in which security practices were inconsistent across the board. While the younger cohort would more often use MFA, they would also neglect to update their basic security solutions, would connect to public Wi-Fi far more often, and didn’t reinforce their security when working remotely.

So, in this way, every age group can be a risk to cybersecurity while they work remotely… it just comes out in different ways.

How Does This Impact Your Business’ Security?

Here’s the hard truth: assuming that one group of users is inherently more or less secure than the other is a recipe for disaster, whether your team is working remotely or coming into the workplace each day. This means that your business’ security lies in your team’s awareness as a cohesive unit, which in turn means you need to do everything you can to keep them vigilant.

To do so, you need to clearly establish rules and procedures for everyone to follow as they’re working, wherever they happen to be at the time. Giving them different materials and exercises to use and evaluating their preparedness can help keep them accountable, as well as reveal to you where your potential vulnerabilities lie and what you need to do to resolve them.

If you need assistance with securing your team’s cybersecurity, reach out to our team here at Voyage Technology. With our help, your team can be secure whether they’re working in the office or at home. Call 800.618.9844 to find out more today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 13 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity Upgrade Business Management VoIP Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Holiday Information Covid-19 Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Office Windows 10 Government IT Support Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Gmail Budget Apple Networking App Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week HIPAA Applications WiFi How To BDR Operating System Computers Healthcare Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Remote Workers Cybercrime Telephone Physical Security Display Printer Cooperation Free Resource Paperless Office Infrastructure Project Management Windows 7 Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Video Conferencing Robot Managed Services Provider Customer Relationship Management Professional Services Saving Time Settings Virtual Machines Wireless Printing Content Filtering Managed IT Service Hacking IT Management Presentation VPN YouTube Meetings Downloads iPhone Cryptocurrency Licensing Wireless Technology Computer Repair Vulnerabilities Entertainment Data Privacy Virtual Desktop Data storage LiFi Images 101 Word Outlook Telephone System Multi-Factor Authentication Mobility Machine Learning Cost Management Money Humor Safety Maintenance Employees Integration Antivirus Sports Mouse User Tip Modem Mobile Security Processor Administration Holidays Data Storage Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Travel Google Maps Management PCI DSS Cortana Chatbots Navigation Techology Distributed Denial of Service Workplace Alt Codes Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Competition Downtime Unified Threat Management Hosted Solution Regulations Compliance Identity Evernote Paperless Unified Threat Management Co-managed IT Typing Bookmark Smart Tech Memes Download Net Neutrality Network Congestion Alerts SQL Server Technology Care User Financial Data Knowledge History Business Communications Google Drive User Error Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement 5G Azure Hybrid Work Point of Sale Unified Communications Social Network Telework Experience Cyber security Multi-Factor Security Tech Human Resources IP Address Google Docs Dark Web Cables Bitcoin Network Management CES Running Cable Tech Support IoT Communitications Trends Supply Chain Management Monitors Google Wallet Recovery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Hard Drives Windows 8 Data Analysis Laptop Websites Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Domains Drones SharePoint Organization Electronic Medical Records Social Networking Legislation Shortcuts Ransmoware Refrigeration Fileless Malware Digital Security Cameras Halloween Smart Devices Content Remote Working Writing Wearable Technology Memory Vendors Public Speaking Lenovo Lithium-ion battery Health IT Virtual Reality Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Hacks Server Management Directions Videos Entrepreneur Scary Stories Private Cloud Assessment Electronic Health Records Identity Theft Fun Wasting Time Threats Superfish Deep Learning Twitter Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Undo Microchip Error Internet Exlporer Software as a Service Education Username Social Engineering Managing Costs Amazon Remote Computing eCommerce Black Friday SSID Virtual Assistant Outsource IT Mobile Computing Database Surveillance Tablet Search IT Technicians Virtual Machine Environment Media Application Best Practice Proxy Server Reviews Alert Cookies Cyber Monday Medical IT Dark Data Hotspot Transportation Small Businesses Managed IT Buisness File Sharing Tactics Development IT solutions How To Mirgation Hypervisor Displays IBM Legal Business Growth Shopping Notifications Nanotechnology Optimization PowerPoint

Blog Archive