<node id="634289">
  <nid>634289</nid>
  <type>news</type>
  <uid>
    <user id="34615"><![CDATA[34615]]></user>
  </uid>
  <created>1586550629</created>
  <changed>1586550629</changed>
  <title><![CDATA[Remote Work Brings Increased Opportunity for Cyber Threats]]></title>
  <body><![CDATA[<p>Teleworking is a concept that has been around for years. However, the recent COVID-19 pandemic has forced nearly everyone around the world to stay in their homes, as many governments and businesses have adopted social distancing techniques to limit or slowdown the spread of the virus, increasing the number of telecommuters to unparalleled levels worldwide in a matter of weeks.</p>

<p>Even though many companies already have remote work policies in place and are well equipped for this type of work environment, cybersecurity risks are swelling as the number of employees working from the comfort of their homes continues to rise.</p>

<p>&ldquo;As an organization, you face the same cybersecurity threats whether you have 10 employees telecommuting or 10,000. What changes is the scale and the probability of a security breach, especially if you are in a rush to implement a remote work policy,&rdquo; states&nbsp;<a href="https://pe.gatech.edu/blog/research-engineer-cybersecurity-expert">Raheem Beyah</a>, executive program director of&nbsp;<a href="https://pe.gatech.edu/degrees/cybersecurity">Georgia Tech&rsquo;s&nbsp;Online Master of Science in Cybersecurity</a>. &ldquo;Many of the top cybersecurity threats that we currently face have been around for years, it&rsquo;s just that teleworking at such a large scale has brought them to light today.&rdquo;</p>

<p>Here are three common threats to cybersecurity to be aware of:</p>

<ol>
	<li><strong>Connecting to unsecure network and using personal devices</strong><br />
	Having to quickly move their workforce from the office to teleworking, many employees may have to use their personal devices and home wi-fi networks for work. Both often lack the protection systems that are built into businesses&rsquo; networks such as firewalls and antivirus software, leaving devices more vulnerable to a cyber threat.</li>
	<li><strong>Phishing campaigns and fraudulent calls</strong><br />
	Working from home means that many employees will rely on email and phone communications from their organizations. This increases the risk of receiving a fraudulent email or phone call to get information such as login details (called &ldquo;phishing&rdquo;), which can lead to a security breach.</li>
	<li><strong>Ransomware and spyware</strong><br />
	Working on a personal network or device coupled with the possibility of receiving a fraudulent email increases the chances of ransomware or spyware being uploaded onto the IT systems of organizations.</li>
</ol>

<p>In such an unprecedented time of uncertainty and isolation, awareness of the circumstances and potential threats is the first step to avoiding any further complications. But what else can you do to minimize these risks and avoid a breach?&nbsp;Read our article on&nbsp;<a href="https://pe.gatech.edu/blog/industry-trends/staying-cyber-safe-while-teleworking">Staying Cyber-Safe while Teleworking</a>&nbsp;for eight helpful tips.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[Know what to watch for in order to stay cyber-safe]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2020-04-10T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[From unsecure networks to phishing scams and spyware, know the top cyber threats to watch for while working from home.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[gtpe-communications@pe.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Georgia Tech Professional Education<br />
<a href="mailto:gtpe-communications@pe.gatech.edu">gtpe-communications@pe.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1258</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1258</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Professional Education]]></item>
      </og_groups_both>
  <field_keywords>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
