{"id":29989,"date":"2020-06-09T06:00:01","date_gmt":"2020-06-09T12:00:01","guid":{"rendered":"https://www.webroot.com/blog/?p=29989"},"modified":"2023-08-31T07:32:49","modified_gmt":"2023-08-31T13:32:49","slug":"your-data-their-devices-accounting-for-cybersecurity-for-personal-computers","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/06\/09\/your-data-their-devices-accounting-for-cybersecurity-for-personal-computers\/","title":{"rendered":"Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers"},"content":{"rendered":"\n<p>Nestled within our chapter on malware in the 2020 Webroot Threat Report is a comparison of infection rates between business and personal devices. The finding that personal devices are <em>about twice as likely<\/em> as business devices to become infected was always significant, if not surprising. <\/p>\n\n\n\n<p>But the advent of the novel coronavirus\u2014a development that followed the publication of the report\u2014has greatly increased the importance of that stat. <\/p>\n\n\n\n<p>According to <a href=\"https:\/\/john-joseph-horton.com\/papers\/remote_work.pdf?\">a joint study<\/a>\nby MIT, Stanford, and the National Bureau of Economic Research (NBER), more\nthan a third (34%) of Americans transitioned to working from home as a result\nof COVID-19. They join approximately 14.6% of workers already working from home\nto bring the total to nearly <em>half<\/em> the entire American workforce. <\/p>\n\n\n\n<p>During remote work many employees are forced or simply able\nto use personal devices for business-related activities. This presents unique\nsecurity concerns according to Webroot threat analyst Tyler Moffitt. <\/p>\n\n\n\n<p>&#8220;In a business setting,&#8221; he says, &#8220;when\nyou\u2019re given a corporate laptop it comes pre-configured based on what the IT\nresource considers best practices for cybersecurity. This often includes group\npolicies, mandatory update settings, data backup, endpoint security, a VPN, et\ncetera.\u201d<\/p>\n\n\n\n<p>Individuals, on the other hand, have much more freedom when\nit comes to device security. They can choose to put off updates to browser\napplications like Java, Adobe, and Silverlight, which often patch exploits that\ncan push <a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/glossary\/what-is-malvertising\">malvertising<\/a>.\nThey can opt to not install an antivirus solution or use a free version. They\ncan ignore the importance of backing up data altogether.<\/p>\n\n\n\n<p>These risky practices threaten small and medium-sized\nbusinesses (SMBs) both immediately and when workers gradually return to their\nshared office spaces as the virus abates. <\/p>\n\n\n\n<p>As our report notes, &#8220;With a higher prevalence of\nmalware and generally fewer security defenses in place, it\u2019s easier for malware\nto slip into the corporate network via an employee\u2019s personal device.&#8221;<\/p>\n\n\n\n<p>What\u2019s at stake, for SMBs, is the loss of mission-critical\nbusiness data due to device damage, data theft via phishing and ransomware, and\nGDPR and CCPA fines for data breaches. Any of these threats on their own could\nbe existential for SMBs. <\/p>\n\n\n\n<h2>What can businesses do to prevent BYOD-enabled data loss?<\/h2>\n\n\n\n<p>\u201cSuper small\nbusinesses may not have the luxury of outlawing all use of personal devices,\u201d\nsays Moffitt. \u201cBYOD is a fact of life now, especially with so many individuals at\nhome, using home computers.\u201d<\/p>\n\n\n\n<p>But employers aren\u2019t\nout of luck entirely. They can still purchase for their employees, and\nencourage the use of, several essential security tools. These include:<\/p>\n\n\n\n<ul>\n<li><strong>Endpoint security software&nbsp;<\/strong>&#8211; Employers should provide endpoint security for home devices when necessary. When it comes to free solutions, you get what you pay for in terms of protection. Currently, there\u2019s the expectation, especially among younger people, that built-in antivirus solutions are enough for blocking advanced threats. In reality, layered security is essential.<\/li>\n\n\n\n<li><strong>Backup and recovery software<\/strong>\u00ad\u00ad &#8211; Many SMBs rely on online shared drives for collaborating. This is dangerous because a single successful phishing attack can unlock all the data belonging to a company. GDPR and CCPA fines don\u2019t differentiate between data stolen from personal or business devices, so this level of risk is untenable. Make sure data is backed up off-site and encrypted.<\/li>\n\n\n\n<li><strong>A VPN&nbsp;<\/strong>&#8211; IT admins or contractors should ensure that any sensitive company data requires a secure VPN connection. Especially with employees connecting on public or unsecure networks, it\u2019s important to guard against snooping for data in transit.<\/li>\n\n\n\n<li><strong>Secure RDPs&nbsp;<\/strong>&#8211; Remote access can be a great option when working from home, but it must be done securely. Too often <a href=\"https:\/\/www.webroot.com\/blog\/2018\/09\/25\/unsecure-rdp-connections-widespread-security-failure\/\">unsecured RDP ports are the source of attacks<\/a>. But, when encrypted and protected by two-factor authentication, they can be used to access secure environments from afar. Many are even free for fewer than five computers.<\/li>\n\n\n\n<li><strong>User education<\/strong> &#8211; Security awareness training is one of the most cost-effective ways of protecting employees from attack on their own devices. Phishing attacks can be simulated and users in need of additional training provided it at very little additional cost. When compared to a data breach, the cost of a few licenses for security training is miniscule.  <\/li>\n<\/ul>\n\n\n\n<h2>Collaboration over coercion<\/h2>\n\n\n\n<p>It\u2019s difficult to mandate\nsecurity solutions on personal devices, but managers need to at least have this\nconversation. Short of installing \u201c<a href=\"https:\/\/www.npr.org\/2020\/05\/13\/854014403\/your-boss-is-watching-you-work-from-home-boom-leads-to-more-surveillance\">tattleware<\/a>,\u201d this has to be a collaborative rather than a coercive effort.<\/p>\n\n\n\n<p>\u201cYou can\u2019t enforce a\ngroup policy on a computer or a network that you don\u2019t own,\u201d reminds Moffitt.\n\u201cIdeally, yes, give each employee a corporate laptop to work at home that\u2019s\nsecurely configured. But if that\u2019s not possible, work with employees to ensure\nthe right steps are taken to secure corporate data.\u201d<\/p>\n\n\n\n<p>Companies should\nwork with IT consultants to source high-performing versions of the solutions\nmentioned above and cover their cost if it\u2019s understood that personal devices\nshould be used during this period of working from home. If taken advantage of,\nit can be an opportunity to foster a culture of <a href=\"https:\/\/www.webroot.com\/blog\/2020\/04\/28\/5-ways-to-improve-business-cyber-resilience\/\">cyber resilience<\/a> and your organization will come out\nstronger, wherever your employees are located. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nestled within our chapter on malware in the 2020 Webroot Threat Report is a comparison of infection rates between business and personal devices. The finding that personal devices are about twice as likely as business devices to become infected was always significant, if not surprising. But the advent of the novel coronavirus\u2014a development that followed [&hellip;]<\/p>\n","protected":false},"author":149,"featured_media":29991,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[25305,24453],"yst_prominent_words":[3943,25509,8895,25507,3769,3517,7909,17761,25505,25503,5405,3695,17849,3479,7339,17771,10427,7911,5359,25185],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29989"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29989"}],"version-history":[{"count":5,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29989\/revisions"}],"predecessor-version":[{"id":31979,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29989\/revisions\/31979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29991"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29989"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29989"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}