Nearly three-quarters of business decision makers – 71 per cent – believe that the shift to 100 per cent remote working during the Covid-19 crisis has increased the likelihood of a cyber breach.
This is according to new data released by cyber security company Centrify, a leading provider of identity-centric privileged access management solutions.
The data was obtained via a poll of 200 senior business decision-makers in medium-sized UK companies conducted by independent polling company Censuswide on behalf of Centrify.
It also revealed that 46 per cent have already noted an increase in phishing attacks since implementing a policy of widespread remote working. The polling took place on March 26 – 27 as the UK government announced much stricter lockdown policies to tackle the Coronavirus, including urging all employees to work from home where possible.
The research also found that 79 per cent of business decision makers have increased their cyber security procedures to manage high volumes of remote access over the next three months.
Similarly, 73 per cent of businesses have given staff extra training on how to remain cyber-safe when working remotely, with specific training around verifying passwords and log-in credentials.
The survey also noted additional fears that IT systems are at risk, with over half (53 per cent) saying they believe that privileged IT admin remote access is at risk of security breach.
Centrify VP Andy Heather, said: “Cyber criminals will no doubt attempt to seize the opportunity presented by the all-out expansion of remote workers, many of whom have not been proficiently trained in even the most basic of cyber security measures.
“Therefore, it is essential that businesses and employees remain vigilant during these challenging times.
“Organisations of all sizes must prioritise security protocols when transitioning employees from an office to a remote working environment. This includes introducing professional training for all employees on how to operate IT and online infrastructure safely, and how to spot unusual or potentially malicious activity.
“Furthermore, businesses should take an Identity-centric approach to secure remote privileged access, to ensure that any hackers and cyber criminals cannot gain access to sensitive systems or data.”
For more information about secure remote access for IT administrators, click here