Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Remote Work a Bigger Risk with Certain Employees?

Is Remote Work a Bigger Risk with Certain Employees?

Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.

As it happens, many business owners hold some preconceived notions as to which of their users constitute the biggest risks while working remotely. Let’s turn our attention to some statistics to see if these notions have any merit.

Cybersecurity in the Home Versus in the Office

Before we begin our review, it is important that we start off by acknowledging one thing: your employees probably aren’t used to subscribing to the same cybersecurity standards at home as they do in the office. While there will be exceptions, your team is generally going to be somewhat lax in their at-home security precautions.

This could easily cause remote work to become problematic. Consider it: when working remotely, your team isn’t operating within the protections installed on your business’ network. As a result, they could unwittingly allow in a threat and thereby give it access to whatever data or resources the individual responsible is privy to. Not only does this reinforce the importance of general access permissions, but it also makes it crucial that you encourage your employees to maintain high standards of security whenever and wherever attending to business matters.

According to a survey taken by the National Cyber Security Alliance, personal security standards are a mixed bag in more ways than one. Compiling the responses of 1000 American adults, with the sample split evenly between those aged 18 to 34 and those from 50 to 75 years of age, this survey helped to identify a few differences in behavior between these two cohorts.

The Survey’s Findings

Many of the insights that this survey presented were somewhat predictable. For instance, the younger cohort were more likely to put multi-factor authentication in place, 89 percent of respondents doing so compared to the elder cohort’s 70 percent. Similar numbers came up when it came to whether a user regularly applied software updates—83 percent of the younger group did, while 63 percent of the older group would.

Having said that, many of the data points generated through this survey told a much more two-sided story… one in which security practices were inconsistent across the board. While the younger cohort would more often use MFA, they would also neglect to update their basic security solutions, would connect to public Wi-Fi far more often, and didn’t reinforce their security when working remotely.

So, in this way, every age group can be a risk to cybersecurity while they work remotely… it just comes out in different ways.

How Does This Impact Your Business’ Security?

Here’s the hard truth: assuming that one group of users is inherently more or less secure than the other is a recipe for disaster, whether your team is working remotely or coming into the workplace each day. This means that your business’ security lies in your team’s awareness as a cohesive unit, which in turn means you need to do everything you can to keep them vigilant.

To do so, you need to clearly establish rules and procedures for everyone to follow as they’re working, wherever they happen to be at the time. Giving them different materials and exercises to use and evaluating their preparedness can help keep them accountable, as well as reveal to you where your potential vulnerabilities lie and what you need to do to resolve them.

If you need assistance with securing your team’s cybersecurity, reach out to our team here at Voyage Technology. With our help, your team can be secure whether they’re working in the office or at home. Call 800.618.9844 to find out more today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Data Recovery Business Management VoIP Smartphones AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Automation Cloud Computing Gadgets Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Vendor Apps Two-factor Authentication Mobile Office Chrome Gmail Networking Budget Apple BYOD App Employer-Employee Relationship Tip of the week Managed Services Mobile Device Management Voice over Internet Protocol How To BDR WiFi HIPAA Applications Computing Access Control Hacker Information Technology Avoiding Downtime Marketing Conferencing Office 365 Augmented Reality Healthcare Managed IT Services Storage Password Bring Your Own Device Big Data Router Virtual Private Network Operating System Computers Health Help Desk Risk Management 2FA Website Retail Office Tips Analytics Scam Firewall Data loss Cooperation Free Resource The Internet of Things Project Management Windows 7 Patch Management Save Money Social Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Going Green Physical Security Display Printer Customer Service Cybercrime Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Telephone Remote Workers Money Licensing Humor iPhone Entertainment Safety Vulnerabilities Sports Data Privacy Mouse Telephone System Images 101 Robot Cost Management Administration Multi-Factor Authentication Mobility IT Management VPN Meetings Customer Relationship Management Settings Employees Integration User Tip Printing Modem Wireless Processor Computer Repair Mobile Security Content Filtering Hacking Presentation YouTube Cryptocurrency Holidays Wireless Technology Smart Technology Data Storage Machine Learning Supply Chain Saving Time Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Professional Services Word Managed IT Service Outlook Maintenance Antivirus Downloads SQL Server Technology Care Browsers Public Speaking Connectivity Social Engineering Break Fix Net Neutrality Remote Computing Financial Data History Lithium-ion battery Business Communications Upload Social Network Hacks Entrepreneur Scary Stories Smartwatch Multi-Factor Security IT Scams Procurement Azure Hybrid Work Tablet IoT Dark Web Fun Alert Telework Cyber security Tech Human Resources Trends Deep Learning Cables Managed IT Customer Resource management Undo File Sharing Regulations CES Dark Data Google Calendar Communitications Supply Chain Management Data Analysis Star Wars Education How To Microsoft Excel Notifications Staff FinTech Term Google Apps Gamification IT Maintenance Mobile Computing Travel Social Networking Legislation IT Assessment Flexibility Value Business Intelligence Techology Fileless Malware Google Maps Search Wearable Technology Organization Shortcuts Content Application Best Practice Ransmoware Health IT Unified Threat Management Motherboard Buisness Digital Security Cameras Comparison Smart Devices Remote Working Memory Vendors Unified Threat Management Directions IBM Legal Assessment IT solutions Permissions Data Breach Google Play Be Proactive Business Growth Workforce Videos Network Congestion Specifications Electronic Health Records Wasting Time Threats User Error Microchip Internet Exlporer Fraud Cortana Trend Micro Security Cameras Workplace Strategies Username Alt Codes Meta Competition Point of Sale Downtime Black Friday Software as a Service Managing Costs Amazon Database Hosted Solution Tech Support IT Technicians eCommerce SSID Network Management Typing Virtual Assistant Outsource IT Proxy Server Cookies Monitors Cyber Monday Surveillance Virtual Machine Environment Google Drive Media Tactics User Hotspot Knowledge Websites Mirgation Reviews Medical IT Transportation Small Businesses Nanotechnology 5G Development Experience Hypervisor Displays SharePoint IP Address Google Docs Addiction Unified Communications Electronic Medical Records Language Bitcoin Chatbots Running Cable Shopping Optimization PowerPoint Management Employer/Employee Relationships Outsourcing Lenovo Google Wallet Screen Reader Writing Distributed Denial of Service PCI DSS Navigation Service Level Agreement Recovery Virtual Reality Computing Infrastructure Server Management Hard Drives Windows 8 Private Cloud Identity Laptop Gig Economy Workplace Teamwork Hiring/Firing Superfish Bookmark Domains Drones Identity Theft Smart Tech Internet Service Provider Twitter Alerts Regulations Compliance Evernote Paperless Download Refrigeration Error Halloween Memes Co-managed IT

Blog Archive