• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Coronavirus • Cybersecurity • Endpoint Security • Endpoint Security Cloud  /  When will IT & ITes businesses understand the data breach dangers from a work from home staff?
When will IT & ITes businesses understand the data breach dangers from a work from home staff?
09 June 2020

When will IT & ITes businesses understand the data breach dangers from a work from home staff?

Written by Seqrite
Seqrite
Coronavirus, Cybersecurity, Endpoint Security, Endpoint Security Cloud

The unprecedented rise of a work from home staff has greatly increased the risk of data breaches for the IT/ITes sector.

With companies forced to mandate Work From Home (WFH) for its employees in the face of the global COVID-19 pandemic, the major focus has been on business continuity. However, IT/ITes companies have also had to reconcile their responsibilities towards keeping client data safe with the fact that most of their employees are now working remotely.

Under the cyber laws of different countries, companies are liable for breach of client data irrespective of whether employees are working remotely or from office. In the case of India, Pavan Duggal, a cyber law expert, opined in an article in Business Standard, “Companies need to quickly realize that when they are allowing work from home, including mission-critical work, they become intermediaries under the Information Technology Act 2000. Hence, they are duty-bound to comply with the parameters of due diligence and other compliances under the Indian cyber law, rules and regulations”.

Below are a few ways in which organizations are vulnerable to data breaches when their employees are working from home:

Deployment risks

While IT & ITes companies had elementary work from home policies (or in some cases, an unofficial WFH policy), these organizations were unprepared for their entire workforces to start working from home overnight, when the COVID-19 crisis hit. Thus, when lockdowns and stay-at-home orders were announced globally, these organizations had to deploy company devices in a WFH situation almost immediately. Consequently, the deployment has not been foolproof and many company devices are now being used in home settings with gaps in their security apparatus, a fact which threat actors are only too aware of.

Bring Your Own Devices

Forced to struggle between meeting client targets and a limited stock of portable devices to provide to employees, many organizations have been forced to allow employees to use their own devices for work-related purposes, hence, creating a Bring Your Own Device (BYOD) policy on the fly. This development represents a major challenge in terms of data security as company data is now being used on personal devices with a high potential for breaches. While IT Security teams had controls over company-owned devices, they cannot exercise the same levels of data control for employees on personal devices.

Unscrupulous or careless employees

Unscrupulous or careless employees who do not understand the importance of data security may click on unauthorized links or download malware on their devices. They may not patch their devices properly or access unsafe/unauthorized websites. These are all vectors for malicious malware and such malware can easily take control of systems and steal company data.

Data breaches can be disastrous and IT Admins now have the added burden of maintaining business continuity while managing data security. Despite the fluid situation, they still need to implement processes and structures where remote working is conducted in secure ways and with proper access controls.

Seqrite Endpoint Security Cloud offers a comprehensive and powerful platform for enterprises to keep their endpoints safe remotely from anywhere. This cloud-based endpoint security and control platform leverages advanced features like Device Control, Data Loss Prevention, Intrusion Detection/Prevention System (IDS/IPS), etc. to ensure complete security with easy manageability.

 Previous PostSeqrite Endpoint Security Cloud supports Windows 10 May 2020 Upda...
Next Post  What are the attack channels used by adversaries to target the ma...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies