KSL INVESTIGATES

Gephardt: Protecting Yourself From Cybersecurity Risks While Working From Home

Jul 22, 2020, 6:35 PM | Updated: 9:22 pm

PARK CITY, Utah – If you’re working from home during the COVID-19 pandemic, you’ll likely be doing that for the foreseeable future. That means cybersecurity has fallen on your shoulders, and the bad guys realize that.

For many businesses, there was a mad rush to get their employees’ computers and network access so they could work remotely. Not every business could supply every employee a company device, so many remote workers are relying on their home networks and their own devices.

That’s frightening to cybersecurity experts like Earl Foote.

“So, suddenly everybody’s grabbing the family desktop or the family laptop or the tablet that they’re working on,” he said. “That’s potentially the same device that the spouse is using for their job, or the kids are using for home — or the kids are using to play on.”

The same concern holds for home networks.

“You’re suddenly doing all of your work at home from a less secure internet connection with a less secure router or firewall,” Foote explained. “And oftentimes those personal devices don’t have any sort of antivirus or anti-malware software. There are no real measures taken. Your vulnerabilities kind of go through the roof.”

Foote is the founder and CEO of Nexus IT Consultants, a company that handles the IT needs for dozens of small and medium-sized Utah businesses. These days, handling cybersecurity has become a lot more challenging. 

What we’re seeing is that cybercriminals know that now, because you have these distributed workforces working on disparate devices in disparate connections,” Foote explained. “Now the attack vectors have increased exponentially.”

Earl Foote, founder and CEO of Nexus IT Consultants.

Attack vectors like data breaches, ransomware, malware and phishing emails disguised as urgent memos from the boss are all on the rise. Making matters worse: Recent surveys have found many telecommuters are cutting corners.  

Half of the employees in one survey said they have worked around cybersecurity policies to get their jobs done efficiently. In another survey, 39 percent of the remote workers surveyed said they often or always access their offices’ data from personal devices while 29 percent feel they can get away with using an app not approved by their office’s IT department. 

“People are kind of fed up with COVID as it is right now anyways, in any of the conditions involved. And so taking extra measures — a lot of people are not willing to go that route,” Foote said. “Unfortunately, if they don’t begin to understand, get on board and start taking some different paths, We’re going to see more and more in organizations that are breached.” 

Not every business could supply every employee a company device, so many remote workers are relying on their home networks and their own devices.

Foote said both businesses and telecommuters need to strengthen their cybersecurity policies and practices, immediately.

“How do we mitigate those risks? How do we put policy in place? And then, how do we educate our team so that they understand and they’re not falling prey and not creating these scenarios that are potentially very disastrous for our business?” he asked. 

Here are three things you can do right now at home that will help prevent a disaster for your employer, without hurting your productivity.

  1. Use complex passwords and change them often.
  2. Keep your system and software updated for any device you use for work. Don’t put that off.
  3. Change your WiFi router’s default password. That is often a cybercrook’s way into a home network.

KSL 5 TV Live

KSL Investigates

Wendie Muhic is the frustrated owner of a 2007 Chevy Tahoe, that dies a lot....

Matt Gephardt & Sloan Schrage

West Jordan car owner says odometer fraud has left her stuck paying thousands on a lemon she can’t drive

Wendie Muhic is the frustrated owner of a 2007 Chevy Tahoe that dies a lot. Now she is left paying for it.

6 days ago

Woman texting...

Matt Gephardt

How crooks use texts to get your money, identity, or both.

If you used a mobile phone for any length of time, it’s likely you have gotten text messages that seem like an honest mistake that innocuous-looking text might have come from a scammer.

7 days ago

...

Daniella Rivera and Keira Fairmont

Treat and Release: How Utah weighs the risk of repeat sex offenders

The KSL Investigators examine Utah’s corrections system, responsible for treating and releasing people who commit sex crimes.

7 days ago

Viewmont High School softball field...

Matt Gephardt and Cindy St. Clair

High school softball team calls foul on field conditions, 2 years after Title IX complaint

The Viewmont High softball team played its 2023 season on a field with dead, patchy grass and none of the improvements promised by the school district. Why weren’t required upgrades completed? Matt Gephardt investigates.

8 days ago

Mechanic works on a car...

Matt Gephardt

Driver apathy keeps tens of thousands of unsafe cars on Utah roads

Every year, the vehicle history report business Carfax releases its study on how many cars are on the roads with unfixed safety recalls.

9 days ago

...

Mike Headrick and Cindy St. Clair

AI Revolution: The past, present, and future of artificial intelligence in Utah 

The world of AI is only as limited as human imagination. So how do you interpret artificial intelligence and its applications in your life? Mike Headrick investigates.   

9 days ago

Sponsored Articles

Brunette guy in headphones playing games on his desktop computer...

PC Laptops

Looking For a New Computer? Use This Desktop Buying Guide

Choosing a new desktop computer can come with a lot of questions, so we created this desktop buying guide.

Portrait of happy boy playing and splashing water in the swimming pool...

Get Out Pass

Family Fun Activities in Utah You Have to Try This Summer

These family fun activities will entertain you all summer, so if you ever feel stuck in a rut wondering what to do, refer to this guide!

Woman IT specialist in elegant suit working on notebook computer in data center next to server rack...

Les Olson

Your Complete Guide to Outsourcing IT Services

This guide covers everything you need to know about the different benefits of outsourcing IT services to meet your small business needs.

diverse group of friends dance outside under string lights...

Lighting Design

5 Frequently Asked Questions About Outdoor Lighting

Read for the most frequently asked questions about outdoor lighting to help narrow the search for your home.

Stack of old laptops with dark background...

PC Laptops

Old Laptop Upgrades You Need to Try Before Throwing it Away

Get the most out of your investment. Try these old laptop upgrades before throwing it out to keep it running fast and efficient.

Happy diverse college or university students are having fun on their graduation day...

BYU MBA at the Marriott School of Business

How to Choose What MBA Program is Right for You: Take this Quiz Before You Apply!

Wondering what MBA program is right for you? Take this quiz before you apply to see if it will help you meet your goals.

Gephardt: Protecting Yourself From Cybersecurity Risks While Working From Home