Cybersecurity in the digital office

Approx. Reading Time: 4 minutes

[av_one_full first min_height=” vertical_alignment=’av-align-top’ space=” row_boxshadow=” row_boxshadow_width=’10’ row_boxshadow_color=” custom_margin=” margin=’0px’ av-desktop-margin=” av-medium-margin=” av-small-margin=” av-mini-margin=” mobile_breaking=” mobile_column_order=” border=” border_style=’solid’ border_color=” radius=” min_col_height=” padding=” av-desktop-padding=” av-medium-padding=” av-small-padding=” av-mini-padding=” svg_div_top=” svg_div_top_color=’#333333′ svg_div_top_width=’100′ svg_div_top_height=’50’ svg_div_top_max_height=’none’ svg_div_top_flip=” svg_div_top_invert=” svg_div_top_front=” svg_div_top_opacity=” svg_div_top_preview=” svg_div_bottom=” svg_div_bottom_color=’#333333′ svg_div_bottom_width=’100′ svg_div_bottom_height=’50’ svg_div_bottom_max_height=’none’ svg_div_bottom_flip=” svg_div_bottom_invert=” svg_div_bottom_front=” svg_div_bottom_opacity=” svg_div_bottom_preview=” column_boxshadow=” column_boxshadow_width=’10’ column_boxshadow_color=” background=’bg_color’ background_color=” background_gradient_direction=’vertical’ background_gradient_color1=’#000000′ background_gradient_color2=’#ffffff’ background_gradient_color3=” src=” background_position=’top left’ background_repeat=’no-repeat’ highlight=” highlight_size=” animation=” animation_duration=” animation_custom_bg_color=” animation_z_index_curtain=’100′ parallax_parallax=” parallax_parallax_speed=” av-desktop-parallax_parallax=” av-desktop-parallax_parallax_speed=” av-medium-parallax_parallax=” av-medium-parallax_parallax_speed=” av-small-parallax_parallax=” av-small-parallax_parallax_speed=” av-mini-parallax_parallax=” av-mini-parallax_parallax_speed=” css_position=” css_position_location=” css_position_z_index=” av-desktop-css_position=” av-desktop-css_position_location=” av-desktop-css_position_z_index=” av-medium-css_position=” av-medium-css_position_location=” av-medium-css_position_z_index=” av-small-css_position=” av-small-css_position_location=” av-small-css_position_z_index=” av-mini-css_position=” av-mini-css_position_location=” av-mini-css_position_z_index=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” mobile_col_pos=’0′ id=” custom_class=” template_class=” aria_label=” av_uid=’av-404p4r’ sc_version=’1.0′]
[av_image src=’http://www.netier.com.au/wp-content/uploads/2023/08/wfh.png’ attachment=’3911′ attachment_size=’full’ copyright=” caption=” image_size=” styling=” box_shadow=’none’ box_shadow_width=’10’ box_shadow_color=” align=’center’ font_size=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ link=” target=” animation=’no-animation’ animation_duration=” animation_custom_bg_color=” animation_z_index_curtain=’100′ parallax_parallax=” parallax_parallax_speed=” av-desktop-parallax_parallax=” av-desktop-parallax_parallax_speed=” av-medium-parallax_parallax=” av-medium-parallax_parallax_speed=” av-small-parallax_parallax=” av-small-parallax_parallax_speed=” av-mini-parallax_parallax=” av-mini-parallax_parallax_speed=” hover=” blur_image=” grayscale_image=” fade_image=” appearance=” css_position=” css_position_location=’,,,’ css_position_z_index=” av-desktop-css_position=” av-desktop-css_position_location=’,,,’ av-desktop-css_position_z_index=” av-medium-css_position=” av-medium-css_position_location=’,,,’ av-medium-css_position_z_index=” av-small-css_position=” av-small-css_position_location=’,,,’ av-small-css_position_z_index=” av-mini-css_position=” av-mini-css_position_location=’,,,’ av-mini-css_position_z_index=” transform_perspective=” transform_rotation=’,,,’ transform_scale=’,,’ transform_skew=’,’ transform_translate=’,,’ av-desktop-transform_perspective=” av-desktop-transform_rotation=’,,,’ av-desktop-transform_scale=’,,’ av-desktop-transform_skew=’,’ av-desktop-transform_translate=’,,’ av-medium-transform_perspective=” av-medium-transform_rotation=’,,,’ av-medium-transform_scale=’,,’ av-medium-transform_skew=’,’ av-medium-transform_translate=’,,’ av-small-transform_perspective=” av-small-transform_rotation=’,,,’ av-small-transform_scale=’,,’ av-small-transform_skew=’,’ av-small-transform_translate=’,,’ av-mini-transform_perspective=” av-mini-transform_rotation=’,,,’ av-mini-transform_scale=’,,’ av-mini-transform_skew=’,’ av-mini-transform_translate=’,,’ mask_overlay=” mask_overlay_shape=’blob’ mask_overlay_size=’contain’ mask_overlay_scale=’100%’ mask_overlay_position=’center center’ mask_overlay_repeat=’no-repeat’ mask_overlay_rotate=” mask_overlay_rad_shape=’circle’ mask_overlay_rad_position=’center center’ mask_overlay_opacity1=’0′ mask_overlay_opacity2=’1′ mask_overlay_opacity3=” title_attr=” alt_attr=” img_scrset=” lazy_loading=’disabled’ id=” custom_class=” template_class=” av_element_hidden_in_editor=’0′ av_uid=’av-llygi1k8′ sc_version=’1.0′ admin_preview_bg=”][/av_image]

[av_hr class=’invisible’ icon_select=’yes’ icon=’ue808′ font=’entypo-fontello’ position=’center’ shadow=’no-shadow’ height=’50’ custom_border=’av-border-thin’ custom_width=’50px’ custom_margin_top=’30px’ custom_margin_bottom=’30px’ custom_border_color=” custom_icon_color=” id=” custom_class=” template_class=” av_uid=’av-5hif8b’ sc_version=’1.0′ admin_preview_bg=”]
[/av_one_full]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-llygj5qu’ sc_version=’1.0′ admin_preview_bg=”]

Cybersecurity in the Digital Office

[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-35tb0b’ sc_version=’1.0′ admin_preview_bg=”]
For many companies and individuals, the “office” is no longer defined as a physical location and has evolved into what is known as the digital office.
[/av_textblock]

[av_hr class=’invisible’ icon_select=’yes’ icon=’ue808′ font=’entypo-fontello’ position=’center’ shadow=’no-shadow’ height=’50’ custom_border=’av-border-thin’ custom_width=’50px’ custom_margin_top=’30px’ custom_margin_bottom=’30px’ custom_border_color=” custom_icon_color=” id=” custom_class=” template_class=” av_uid=’av-3k5uor’ sc_version=’1.0′ admin_preview_bg=”]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-llyglupx’ sc_version=’1.0′ admin_preview_bg=”]

What is a digital office?

[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-llygn6mi’ sc_version=’1.0′ admin_preview_bg=”]
A digital office is the systems, software and processes staff of a company utilise to perform their job role. Work from Home (WFH) is the most common use of a digital office as seen today.

The digital office offers numerous advantages for both employees and companies. Research shows a 56% reduction in unproductive time when working from home compared to a physical office, a cost reduction in company overheads and a general increase in employee satisfaction. However, it also presents new challenges in protecting company data and systems from threat actors.

When most companies were forced to move to the digital office due to COVID-19, many were unaware of the additional cyber security risks associated with this shift. As the workforce continues to embrace the benefits and flexibility of the digital office, it’s important for companies to understand and, most importantly, mitigate these potential risks.
[/av_textblock]

[av_hr class=’invisible’ icon_select=’yes’ icon=’ue808′ font=’entypo-fontello’ position=’center’ shadow=’no-shadow’ height=’50’ custom_border=’av-border-thin’ custom_width=’50px’ custom_margin_top=’30px’ custom_margin_bottom=’30px’ custom_border_color=” custom_icon_color=” id=” custom_class=” template_class=” av_uid=’av-1uvpe3′ sc_version=’1.0′ admin_preview_bg=”]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-llygnw99′ sc_version=’1.0′ admin_preview_bg=”]

The risks and how to mitigate them

[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-llygol3e’ sc_version=’1.0′ admin_preview_bg=”]

Personal Devices

[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-4jr58b’ sc_version=’1.0′ admin_preview_bg=”]

The Risks

You can’t secure what you can’t see or control, and staff use their personal computers to access company resources. Questions arise: Are the hardwares updated and have the latest patches? Do they have antivirus protection? Who has access to these devices? How do you stop people from using personal devices if they have a company-issued device (known as shadow IT)?

The Solution

The optimal approach involves equipping staff with a managed corporate issue device that allows remote patching and security management to access company resources. Additionally, hosted desktop environments like Citrix, AVD or Remote Desktop allow staff more flexibility with the device used for access while keeping company data secure.
[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-llygy0hu’ sc_version=’1.0′ admin_preview_bg=”]

Home Networks

[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-26o363′ sc_version=’1.0′ admin_preview_bg=”]

The Risks

Many remote workers use Internet of Things (IoT) devices. These include smart speakers, home security systems, and thermostats. These devices can introduce vulnerabilities to your home network if not properly secured.

The Solution

To counter this risk, make sure to change the default passwords on your IoT devices. Also, keep them updated with the latest firmware.

Besides that, basic home network security guidelines are available online that can help you significantly improve your network security.

Moreover, software solutions such as VPN’s can also increase the security of work data accessed from a home network.
[/av_textblock]

[av_textblock textblock_styling_align=” textblock_styling=” textblock_styling_gap=” textblock_styling_mobile=” size=” av-desktop-font-size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” template_class=” av_uid=’av-4otbvf’ sc_version=’1.0′ admin_preview_bg=”]

User Education

If you were to ask ten cybersecurity professionals about the greatest cyber risk in an environment, nine out of ten would point to users. This is not because people are malicious, lazy or apathetic about cyber security. Instead, many are not provided with help and education to spot and avoid cyber incidents.

Providing the tools and education to empower your staff in cyber security will likely provide greater protection than the other solutions presented here.

Stay secure. Contact us today!

These are just some of the ways you can help stay secure. The benefits of embracing the digital office can vastly outweigh the potential downsides, provided you are cognizant of your cyber security risk and implement solid solutions, policies and educational initiatives.

If you want to know more about digital office security or cyber solutions for your work, contact Netier today!
[/av_textblock]

[av_button label=’Contact Us’ icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ link=’manually,https://www.netier.com.au/contact/’ link_target=” size=’large’ position=’center’ label_display=” title_attr=” size-text=” av-desktop-font-size-text=” av-medium-font-size-text=” av-small-font-size-text=” av-mini-font-size-text=” margin=” margin_sync=’true’ padding=” padding_sync=’true’ av-desktop-margin=” av-desktop-margin_sync=’true’ av-desktop-padding=” av-desktop-padding_sync=’true’ av-medium-margin=” av-medium-margin_sync=’true’ av-medium-padding=” av-medium-padding_sync=’true’ av-small-margin=” av-small-margin_sync=’true’ av-small-padding=” av-small-padding_sync=’true’ av-mini-margin=” av-mini-margin_sync=’true’ av-mini-padding=” av-mini-padding_sync=’true’ color_options=” color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’ btn_color_bg=’theme-color’ btn_custom_grad_direction=’vertical’ btn_custom_grad_1=’#000000′ btn_custom_grad_2=’#ffffff’ btn_custom_grad_3=” btn_custom_grad_opacity=’0.7′ btn_custom_bg=’#444444′ btn_color_bg_hover=’theme-color-highlight’ btn_custom_bg_hover=’#444444′ btn_color_font=’theme-color’ btn_custom_font=’#ffffff’ btn_color_font_hover=’white’ btn_custom_font_hover=’#ffffff’ border=” border_width=” border_width_sync=’true’ border_color=” border_radius=” border_radius_sync=’true’ box_shadow=” box_shadow_style=’0px,0px,0px,0px’ box_shadow_color=” animation=” animation_duration=” animation_custom_bg_color=” animation_z_index_curtain=’100′ hover_opacity=” sonar_effect_effect=” sonar_effect_color=” sonar_effect_duration=’1′ sonar_effect_scale=” sonar_effect_opac=’0.5′ css_position=” css_position_location=’,,,’ css_position_z_index=” av-desktop-css_position=” av-desktop-css_position_location=’,,,’ av-desktop-css_position_z_index=” av-medium-css_position=” av-medium-css_position_location=’,,,’ av-medium-css_position_z_index=” av-small-css_position=” av-small-css_position_location=’,,,’ av-small-css_position_z_index=” av-mini-css_position=” av-mini-css_position_location=’,,,’ av-mini-css_position_z_index=” id=” custom_class=” template_class=” av_uid=’av-llyil4qg’ sc_version=’1.0′ admin_preview_bg=”]

Search

Resources

Bouncing back from a cyber attack: Building resilience for a growing business

Services

Managed IT Services

Related blogs

Compliance for Australian SMEs: Essential Eight vs NIST

ISO 27001: Our commitment to security

Cyber security for small businesses: Developing a proactive defence plan

Categories