As Offices Reopen, Hardware from Home Threatens ... | #corporatesecurity | #businesssecurity | #

Devices out of sight for the past several months could spell trouble when employees bring them back to work.

As COVID-19 quarantine restrictions ease, many companies are implementing plans for when their employees return to the workplace. And for good reason: Come September, the majority of senior technology executives expect more than half of their workers will be heading back to the office, according to a recent CNBC Technology Executive Council survey of senior technology executives.


While many variables are still to unfold between now and September, organizations that do scale up in-office work are focused on safety protocols, including social distancing, face masks, and temperature reading for employees. But they may be overlooking another risk: the devices heading back into corporate walls after months of operating on home networks.


“Many CISOs lost most of their ability to control what hardware devices were used by their remote employees,” says Yossi Appleboum, CEO of hardware device security firm Sepio Systems and a former hardware security intelligence agent. “Many of these employees have connected uncontrolled peripheral devices to their corporate laptops. These peripherals are potentially cyberattack tools used by bad actors to gain access to secured organizations and, in most cases, cannot be seen by the installed endpoint security tools.”


Unsurprisingly, device use and access across households dramatically increased over the past several months – as well as the opportunity for devices to be compromised due to open networks. The fact is, corporate-own devices on home networks simply could not be as tightly controlled by IT. And research shows home networks are much less secure.


Research from Bitsight, for example, recently revealed that home networks are 3.5 times more likely than corporate networks to have at least one malware family — and 7.5 times more likely to have five or ..

Support the originator by clicking the read the rest link below.