30% of remote employees admit to having an online account compromised on a work device

Work From Home for Social Distancing in Coronavirus Covid-19 Situation, Woman Designer Using Laptop on Flooring Carpet at Her Home. Above View of Creative Design Woman is Working Online at Home

A OneLogin survey covered how employees are using work devices for a variety of other things.

The transition to working from home has been rocky for millions of people as they adjust to transitioning workplace policies into the privacy of their own home. According to a new report from cybersecurity firm OneLogin, people are using work devices for much more than work, even after they’ve had accounts or passwords compromised.

The company’s 2020 COVID-19 State of Remote Work Survey Report features a global survey of 5,000 employees who started working remotely since the outbreak of COVID-19.

Of those surveyed, 30% have had a corporate device breached and only 10% changed the password afterwards. Half of organizations globally have not established cybersecurity guidelines regarding remote work according to the survey and US remote employees use work devices to access adult entertainment sites more than any other country.

Half of UK respondents had not changed their home Wi-Fi password in the last two years, compared with 36% overall, and 25% never changed their password while 45% of US workers have given their work passwords to their child or spouse, compared to 13% in the UK and 9% in France.

Continue reading… “30% of remote employees admit to having an online account compromised on a work device”

0

These are the 6 hottest jobs of 2020

389A0502-8632-41DE-88F9-422F0B07DCC1

New year, new job. Maybe even a new career. If you’ve been making promises like this to yourself for years, 2020 may be the time to turn them into reality. After all, with the unemployment rate the lowest it’s been in half a century, job seekers have the upper hand. Not only do employers have to work harder to gain their attention, but in some jobs they have to craft more attractive offers, too.

“Increasing pay is the simplest and most powerful way to attract and retain workers,” says Nick Bunker, an economist at Indeed Hiring Lab. “Money speaks, and it speaks pretty loudly.”

But that’s not the only good news: Hiring managers can’t afford to be as picky either, says Guy Berger, principal economist at LinkedIn.

“Employers who used to demand people who went to top-tier schools are now more open-minded,” he says. Not only that, but “hiring managers are much more receptive to individuals who need to grow into a job or want to try something new.”

Continue reading… “These are the 6 hottest jobs of 2020”

0

Too few cybersecurity professionals is a gigantic problem for 2019

Hacker team coding at laptop and computer monitor at hackathon in dark office

As the new year begins gaining steam, there is ostensibly a piece of good news on the cyber front. Major cyberattacks have been in a lull in recent months, and still are.

The good tidings are fleeting, however. Attacks typically come in waves. The next one is due, and 2019 will be the worst year yet — a sad reality as companies increasingly pursue digitization to drive efficiency and simultaneously move into the “target zone” of cyberattacks.

This bad news is compounded by the harsh reality that there are not nearly enough cybersecurity pros to properly respond to all the threats.

Continue reading… “Too few cybersecurity professionals is a gigantic problem for 2019”

0

China hackers are after U.S. military drone technology

This is the largest campaign we’ve seen that has been focused on drone technology.

Chines hackers based in Shanghai went after one foreign defense contractor after another, at least 20 in all, for nearly two years. Their target, according to an American cyber security company that monitored the attacks, was the technology behind the United States’ clear lead in military drones.

 

 

Continue reading… “China hackers are after U.S. military drone technology”

0

Ten Critical Trends For Cybersecurity

cybersecurity_graphic

The Internet, private networks, VPNs, and a host of other technologies are quickly weaving the planet into a single, massively complex “infosphere.” These connections cannot be severed without overwhelming damage to companies and even economies. Yet, they represent unprecedented vulnerabilities to espionage and covert attack.

 

Continue reading… “Ten Critical Trends For Cybersecurity”

0