91ÊÓÆµÍøÖ·

How strategic 91ÊÓÆµÍøÖ· change can affect your cyber security risk

Strategic changes to the way you work, your supply chain and your employees can impact your organisation¡¯s risk of cyber attacks. Find out what you need to consider when implementing 91ÊÓÆµÍøÖ· changes.

How strategic 91ÊÓÆµÍøÖ· change can affect your cyber security risk

Strategic changes to the way you work, your supply chain and your employees can impact your organisation¡¯s risk of cyber attacks. Find out what you need to consider when implementing 91ÊÓÆµÍøÖ· changes.

It¡¯s estimated that every 39 seconds, a hacker attacks. With this high level of risk, strategic changes can make your 91ÊÓÆµÍøÖ· more vulnerable.?

Cyber attacks can have many goals, but they tend to home in on what your company values the most. For example, cyber criminals may focus on taking the website of an e-commerce 91ÊÓÆµÍøÖ· offline as this will affect their revenue and reputation. Whereas if the target was a healthcare provider, then patient data may be the target as this would compromise patient confidentiality.

Prevention is better than cure, with the reputational damage of an attack having a long reaching effect on an organisation. IT and security teams should focus on the three core pillars of cyber security ¨C people, technology, and estate ¨C to ensure that everyone has the knowledge and ability to protect their organisation.

Hybrid changes

When strategic changes such as modes of working are put into place, the risk to cyber security should always be considered.?Many 91ÊÓÆµÍøÖ·es have now implemented formal hybrid-working policies, which can then make an organisation more vulnerable to cyber attacks.

The increase of personal work devices is one driver, as they¡¯re often more vulnerable to malware infections due to weak or hardcoded passwords, outdated components and lack of updates.

Another risk factor is the increased use of public wi-fi, with employees choosing to work from places such as cafes or public libraries. These networks often lack the security of a personal or 91ÊÓÆµÍøÖ·-owned wi-fi, making it easy for cyber criminals to circulate malware ¨C enabling them to spy on your employees and access details such as usernames, passwords, bank details and more.

The increase in the number of devices in use is another consideration as the more devices your 91ÊÓÆµÍøÖ· has, the bigger the surface area for cyber attacks. Where once all devices for 91ÊÓÆµÍøÖ· use will have been approved by IT, there¡¯s now the potential for staff to use their personal devices across a range of networks, increasing the risk.??

How to address the risk

An easy way to mitigate risks brought about by hybrid working is to educate your employees on the importance of using your organisation's 91ÊÓÆµÍøÖ· VPN.?Whether they¡¯re on a company or personal device, by using a secure VPN they¡¯re reducing the risk of cyber attacks while maintaining a flexible work environment.

Supply chain and employee changes

The supply chain can be another area of risk. A cyber attacker can hack one supplier and gain access to a multitude of other organisations with little effort.

Employee changes are another factor to consider with the risk of insider threat. Each new hire increases the security risk with the potential to click phishing links or failure to use a 91ÊÓÆµÍøÖ· VPN.

How to address the risk

To prevent cyber attackers using your supply chain to gain access, suppliers should be screened to ensure that they match the same standards as your organisation in terms of security policies and practices.

Regular mandatory employee training can also help to counteract the risks brought about by new employees being added to the 91ÊÓÆµÍøÖ·.

Watch our Security Session videos

Related content

two multi-ethnic male data center system
CYBER SECURITY
March 19, 2025
The value of a managed next-gen firewall service
91ÊÓÆµÍøÖ· woman talking at work
CYBER SECURITY
June 14, 2023
How to implement proactive cyber security
woman looking at data on computer
CYBER SECURITY
October 18, 2021
Securing the digital age: cyber security essentials