{"id":1374786,"date":"2023-06-05T14:19:10","date_gmt":"2023-06-05T14:19:10","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1374786"},"modified":"2023-06-05T14:29:21","modified_gmt":"2023-06-05T14:29:21","slug":"cybersecurity-remote-work","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/","title":{"rendered":"Cybersecurity in the Age of Remote Work"},"content":{"rendered":"<h1 style=\"\">Cybersecurity in the Age of Remote Work<\/h1>\n<p><span><img decoding=\"async\" alt=\"image showing cybersecurity for remote work\" data-id=\"1374798\" width=\"1080\" data-init-width=\"2560\" data-init-height=\"803\" title=\"cyber security with remote work\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/06\/cyber-security-with-remote-work-scaled.jpg?_t=1685975202\" data-link-wrap=\"true\" data-width=\"1080\" height=\"803\" style=\"\"><\/span><\/p>\n<h2 data-block-id=\"block-65725286-c883-4036-bfc8-85cb13961f58\" style=\"\">The impact of remote work on cybersecurity<\/h2>\n<p>The rise of remote work has been a growing trend in recent years. The COVID-19 pandemic has accelerated this shift. While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity.<\/p>\n<p>As employees access company data and systems from outside the office, the risk of cyber attacks increases. This is because remote workers may be using unsecured networks or devices that are not properly protected. Additionally, they may not be as vigilant about security best practices when working from home.<\/p>\n<p>To mitigate these risks, businesses need to take proactive steps to ensure their remote workforce is secure.<\/p>\n<p>Here are some tips:<\/p>\n<h2 data-block-id=\"block-e7011b1a-01ca-49e6-8a64-8a273e8bd52e\" style=\"\">Password policies and two-factor authentication<\/h2>\n<p>It is highly recommended to implement robust password policies and two-factor authentication measures to ensure that unauthorized access to company data is prevented. By doing so, you can significantly reduce the risk of security breaches and protect sensitive information from being compromised.<\/p>\n<p>Strong password policies entail setting up guidelines for creating passwords that are difficult to guess or crack. This includes requiring a minimum length, complexity, and regular password changes. Additionally, it is crucial to educate employees on the importance of using unique passwords for each account and avoiding common phrases or personal information.<\/p>\n<p>Two-factor authentication adds an extra layer of security by requiring users to provide two forms of identification before accessing company data. This could be a combination of something they know (such as a password) and something they have (such as a security token or fingerprint). By implementing this measure, you can ensure that even if a password is compromised, the attacker would still need to provide additional authentication to gain access.<\/p>\n<p>Overall, implementing strong password policies and two-factor authentication is a critical step in safeguarding your company&#8217;s data and preventing unauthorized access. It is essential to prioritize cybersecurity measures to avoid costly data breaches and maintain the trust of your customers and stakeholders.<\/p>\n<h2 data-block-id=\"block-86aa912c-c711-429c-b8a7-550070b1a413\" style=\"\">Update software and use secure devices<\/h2>\n<p>It is highly recommended to furnish your employees with secure devices and software that are consistently updated to safeguard against known vulnerabilities. This measure ensures that your company&#8217;s sensitive information remains protected from potential cyber threats. By providing your staff with secure devices, you can prevent unauthorized access to confidential data and minimize the risk of data breaches. Regular updates to the software installed on these devices are also crucial in maintaining their security. These updates often contain patches that address any known vulnerabilities, making it more difficult for hackers to exploit them. Therefore, it is imperative to prioritize the security of your company&#8217;s devices and software by providing your employees with secure tools and keeping them up-to-date.<\/p>\n<h2 data-block-id=\"block-5a6457d6-3a04-4728-bb97-96919c1f6d78\" style=\"\">Use VPN technology<\/h2>\n<p>One effective way to secure the connection between remote workers and company systems is by utilizing virtual private network (VPN) technology. This technology encrypts all traffic passing through it, ensuring that sensitive information remains confidential and protected from unauthorized access. By implementing a VPN, remote workers can securely access company resources without compromising the security of the organization&#8217;s data. It is a reliable solution that provides an additional layer of protection against cyber threats. Additionally, it ensures that remote workers can work efficiently and safely. Therefore, it is highly recommended to use VPN technology for securing the connection between remote workers and company systems.<\/p>\n<h2 data-block-id=\"block-c995271b-500a-441d-9c04-e57a22374881\" style=\"\">Educate employees and provide regular training<\/h2>\n<p>It is crucial to educate all employees about the significance of cybersecurity in today&#8217;s digital age. Regular training sessions should be conducted to equip them with the necessary skills to identify and avoid common threats, such as phishing emails.<\/p>\n<p>Phishing emails are a type of cyber attack that involves tricking individuals into providing sensitive information, such as login credentials or financial details. These attacks can have severe consequences, including data breaches, financial losses, and reputational damage.<\/p>\n<p>To prevent such incidents from occurring, it is essential to provide employees with the knowledge and tools they need to recognize and respond appropriately to phishing attempts. This can include:<\/p>\n<ol>\n<li>training on how to spot suspicious emails, <\/li>\n<li>how to verify the authenticity of requests for sensitive information, and <\/li>\n<li>how to report potential security incidents.<\/li>\n<\/ol>\n<p>By investing in regular cybersecurity training for employees, organizations can significantly reduce their risk of falling victim to cyber attacks. It is a small but critical step towards safeguarding sensitive data and protecting the organization&#8217;s reputation. So, make sure to prioritize cybersecurity education and training for your employees to ensure a secure and safe work environment.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;16871&#8221;:{&#8220;name&#8221;:&#8221;Accent Darker&#8221;,&#8221;parent&#8221;:&#8221;43816&#8243;,&#8221;lock&#8221;:{&#8220;saturation&#8221;:0}},&#8221;43816&#8243;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1},&#8221;4592d&#8221;:{&#8220;name&#8221;:&#8221;Accent Lighter&#8221;,&#8221;parent&#8221;:&#8221;43816&#8243;,&#8221;lock&#8221;:{&#8220;lightness&#8221;:1,&#8221;saturation&#8221;:1}}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;16871&#8221;:{&#8220;val&#8221;:&#8221;rgb(3, 3, 3)&#8221;,&#8221;hsl_parent_dependency&#8221;:{&#8220;h&#8221;:80,&#8221;l&#8221;:0.01,&#8221;s&#8221;:-0.05}},&#8221;43816&#8243;:{&#8220;val&#8221;:&#8221;rgb(171, 212, 107)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:83,&#8221;s&#8221;:0.5497,&#8221;l&#8221;:0.6255,&#8221;a&#8221;:1}},&#8221;4592d&#8221;:{&#8220;val&#8221;:&#8221;rgb(244, 250, 235)&#8221;,&#8221;hsl_parent_dependency&#8221;:{&#8220;h&#8221;:84,&#8221;l&#8221;:0.95,&#8221;s&#8221;:0.58}}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;16871&#8221;:{&#8220;val&#8221;:&#8221;rgb(29, 23, 12)&#8221;,&#8221;hsl_parent_dependency&#8221;:{&#8220;h&#8221;:38,&#8221;s&#8221;:0.41,&#8221;l&#8221;:0.08,&#8221;a&#8221;:1}},&#8221;43816&#8243;:{&#8220;val&#8221;:&#8221;rgb(255, 204, 102)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:40,&#8221;s&#8221;:1,&#8221;l&#8221;:0.7,&#8221;a&#8221;:1}},&#8221;4592d&#8221;:{&#8220;val&#8221;:&#8221;rgb(250, 246, 236)&#8221;,&#8221;hsl_parent_dependency&#8221;:{&#8220;h&#8221;:42,&#8221;s&#8221;:0.58,&#8221;l&#8221;:0.95,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__  <\/p>\n<h3 style=\"\"><span>Are your policies&nbsp;<\/span><span><strong>read on time and by the right people?<\/strong><\/span><\/h3>\n<p style=\"text-align: center;\">Make compliance simple<\/p>\n<p>  <a href=\"https:\/\/www.collaboris.com\/\" style=\"border-radius: 0px; overflow: hidden;\" target=\"_blank\" rel=\"noopener\"> <span style=\"\"><span style=\"\">See how<\/span><\/span> <\/a>   <\/p>\n<h2 data-block-id=\"block-39f818e0-4eb8-4477-a63d-e8c0a9aee6d3\" style=\"\">Conclusion<\/h2>\n<p>By taking these steps, businesses can help ensure that their remote workforce remains secure and productive. As remote work continues to grow in popularity, cybersecurity will only become more important. It&#8217;s up to businesses to stay ahead of the curve and keep their data safe.<\/p>\n<h2 id=\"t-1646317658621\" style=\"text-align: left;\">You may also like:<\/h2>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#comments\" dynamic-postlink=\"tcb_post_comments_link\" data-shortcode-id=\"1374528\"><\/a><\/p>\n<h2 style=\"\" id=\"t-1646317658622\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;#&quot;,&quot;title&quot;:&quot;Cybersecurity in the Age of Remote Work&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\" title=\"Cybersecurity in the Age of Remote Work\" data-css=\"\">Cybersecurity in the Age of Remote Work<\/a><\/span><\/h2>\n<p>Cybersecurity in the Age of Remote WorkThe impact of remote work on cybersecurityThe rise <a href=\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#more-1374786\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\"><span><span>Read More<\/span><\/span><\/a><a href=\"https:\/\/www.collaboris.com\/benefits-challenges-knowledge-management\/#comments\" dynamic-postlink=\"tcb_post_comments_link\" data-shortcode-id=\"1374528\"><\/a><\/p>\n<h2 style=\"\" id=\"t-1646317658622\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;#&quot;,&quot;title&quot;:&quot;Cybersecurity in the Age of Remote Work&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/benefits-challenges-knowledge-management\/\" title=\"Benefits and challenges of Knowledge Management\" data-css=\"\">Benefits and challenges of Knowledge Management<\/a><\/span><\/h2>\n<p>Benefits and challenges of knowledge managementThis post will explore the benefits and challenges of <a href=\"https:\/\/www.collaboris.com\/benefits-challenges-knowledge-management\/#more-1374765\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/benefits-challenges-knowledge-management\/\"><span><span>Read More<\/span><\/span><\/a><a href=\"https:\/\/www.collaboris.com\/introduction-knowledge-management\/#comments\" dynamic-postlink=\"tcb_post_comments_link\" data-shortcode-id=\"1374528\"><\/a><\/p>\n<h2 style=\"\" id=\"t-1646317658622\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;#&quot;,&quot;title&quot;:&quot;Cybersecurity in the Age of Remote Work&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/introduction-knowledge-management\/\" title=\"Introduction to Knowledge Management in your organization\" data-css=\"\">Introduction to Knowledge Management in your organization<\/a><\/span><\/h2>\n<p>Introduction to Knowledge Management in your organizationIn today&#8217;s fast-paced business environment, knowledge is a <a href=\"https:\/\/www.collaboris.com\/introduction-knowledge-management\/#more-1374747\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/introduction-knowledge-management\/\"><span><span>Read More<\/span><\/span><\/a><a href=\"https:\/\/www.collaboris.com\/what-is-a-metapolicy\/#comments\" dynamic-postlink=\"tcb_post_comments_link\" data-shortcode-id=\"1374528\"><\/a><\/p>\n<h2 style=\"\" id=\"t-1646317658622\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;#&quot;,&quot;title&quot;:&quot;Cybersecurity in the Age of Remote Work&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/what-is-a-metapolicy\/\" title=\"What is a Metapolicy?\" data-css=\"\">What is a Metapolicy?<\/a><\/span><\/h2>\n<p>What is a Metapolicy? A metapolicy is a valuable tool for organizations seeking to <a href=\"https:\/\/www.collaboris.com\/what-is-a-metapolicy\/#more-1374730\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/what-is-a-metapolicy\/\"><span><span>Read More<\/span><\/span><\/a><a href=\"https:\/\/www.collaboris.com\/process-standardization-business-success\/#comments\" dynamic-postlink=\"tcb_post_comments_link\" data-shortcode-id=\"1374528\"><\/a><\/p>\n<h2 style=\"\" id=\"t-1646317658622\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;#&quot;,&quot;title&quot;:&quot;Cybersecurity in the Age of Remote Work&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/process-standardization-business-success\/\" title=\"Process Standardization: A Key to Business Success\" data-css=\"\">Process Standardization: A Key to Business Success<\/a><\/span><\/h2>\n<p>Process Standardization: A Key to Business SuccessProcess standardization refers to the practice of establishing <a href=\"https:\/\/www.collaboris.com\/process-standardization-business-success\/#more-1374713\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/process-standardization-business-success\/\"><span><span>Read More<\/span><\/span><\/a><a href=\"https:\/\/www.collaboris.com\/target-external-content-office-365\/#comments\" dynamic-postlink=\"tcb_post_comments_link\" data-shortcode-id=\"1374528\"><\/a><\/p>\n<h2 style=\"\" id=\"t-1646317658622\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;#&quot;,&quot;title&quot;:&quot;Cybersecurity in the Age of Remote Work&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/target-external-content-office-365\/\" title=\"Target external content with Office365 and DocRead\" data-css=\"\">Target external content with Office365 and DocRead<\/a><\/span><\/h2>\n<p>Target external content with Office365 and DocRead Microsoft 365 \/ SharePoint Online is an <a href=\"https:\/\/www.collaboris.com\/target-external-content-office-365\/#more-1374663\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/target-external-content-office-365\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity in the Age of Remote Work The impact of remote work on cybersecurity The rise of remote work has been a growing trend in recent years. The COVID-19 pandemic has accelerated this shift. While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity. As employees [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1374786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity in the Age of Remote Work<\/title>\n<meta name=\"description\" content=\"While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in the Age of Remote Work\" \/>\n<meta property=\"og:description\" content=\"The rise of remote work has been a growing trend in recent years, but the COVID-19 pandemic has accelerated this shift. While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity. As employees access company data and systems from outside the office, the risk of cyber attacks increases. This is because remote workers may be using unsecured networks or devices that are not properly protected. Additionally, they may not be as vigilant about security best practices when working from home. To mitigate these risks, businesses need to take proactive steps to ensure their remote workforce is secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-05T14:19:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T14:29:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/06\/cyber-security-with-remote-work-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"803\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity in the Age of Remote Work\",\"datePublished\":\"2023-06-05T14:19:10+00:00\",\"dateModified\":\"2023-06-05T14:29:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\"},\"wordCount\":1062,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\",\"name\":\"Cybersecurity in the Age of Remote Work\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-06-05T14:19:10+00:00\",\"dateModified\":\"2023-06-05T14:29:21+00:00\",\"description\":\"While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the Age of Remote Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity in the Age of Remote Work","description":"While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity in the Age of Remote Work","og_description":"The rise of remote work has been a growing trend in recent years, but the COVID-19 pandemic has accelerated this shift. While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity. As employees access company data and systems from outside the office, the risk of cyber attacks increases. This is because remote workers may be using unsecured networks or devices that are not properly protected. Additionally, they may not be as vigilant about security best practices when working from home. To mitigate these risks, businesses need to take proactive steps to ensure their remote workforce is secure.","og_url":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-06-05T14:19:10+00:00","article_modified_time":"2023-06-05T14:29:21+00:00","og_image":[{"width":2560,"height":803,"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/06\/cyber-security-with-remote-work-scaled.jpg","type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_description":"While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity in the Age of Remote Work","datePublished":"2023-06-05T14:19:10+00:00","dateModified":"2023-06-05T14:29:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/"},"wordCount":1062,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/","url":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/","name":"Cybersecurity in the Age of Remote Work","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-06-05T14:19:10+00:00","dateModified":"2023-06-05T14:29:21+00:00","description":"While working from home offers many benefits, it also presents new challenges for businesses when it comes to cybersecurity","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-remote-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-remote-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the Age of Remote Work"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1374786"}],"version-history":[{"count":13,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374786\/revisions"}],"predecessor-version":[{"id":1374801,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374786\/revisions\/1374801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1374786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1374786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1374786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}