Intelligent CISO Issue 51 | Page 68

Of the 39 % of businesses in the UK that identified a cyberattack in 2021 , 83 % were phishing attempts and 21 % identified a more sophisticated attack type .
decrypting myths

Of the 39 % of businesses in the UK that identified a cyberattack in 2021 , 83 % were phishing attempts and 21 % identified a more sophisticated attack type .

for organisations to address risks before implementing processes they might be unfamiliar with , such as BYOD . It is always easier to prevent security risks from happening , rather than attempting to fix it at a later date and although it sounds relatively straight-forward , many do learn the hard way .
So , how exactly does BYOD impact cybersecurity ? If a member of staff downloads unfamiliar information to a device , they are automatically putting themselves at risk of bad actors . If anything from a downloaded application to a PDF document contains a virus , it has the potential to pass this through the organisation ’ s network whenever the employee next logs in . This could significantly compromise the security of the whole business , so members of staff need to be vigilant when it comes to distinguishing the difference between corporate and personal data .
Employers need to recognise how easy it is for staff members to accidently expose the corporate network and how it is more common than they may anticipate . In fact , a survey conducted by Tessian , found that 43 % of people have admitted to making a mistake at work which has had security repercussions , while 47 % of people working in the tech industry have clicked on a phishing email at work . Hackers are aware that most data breaches occur due to human error , which is why phishing scams occur so often . It is vital that staff members know about how cybercriminals work and how they are constantly on the hunt for the most important information they can get their hands on .
Best practices to consider
There are a number of preventative measures which organisations can take to better secure data in the current hybrid working world . A few key examples include employers investing in cloud-based malware protection tools , educating employees about the associated risks and how they can best protect themselves , and encrypting BYOD devices , as well as all corporate data .
By implementing compulsory training sessions for members of staff , enterprises give employees the opportunity to learn what it takes to make themselves less vulnerable to bad actors . Although it may not feel like it , remote working is still a relatively new concept for many individuals . Therefore , brushing up on best practices such as secure passwords on all devices , data security management and general safer online habits will help significantly . To
68 www . intelligentciso . com