Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking and Finance Review - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > Why Working from Home Could Take Down Your Business – Beware These Security Threats
    Business

    Why Working from Home Could Take Down Your Business – Beware These Security Threats

    Published by linker 5

    Posted on September 2, 2020

    5 min read

    Last updated: January 21, 2026

    This image illustrates the security challenges businesses face with remote work. It highlights the importance of cybersecurity measures against threats like phishing and ransomware in a home office setup.
    Remote work security threats in business environments - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    By Bruce Penson, Managing Director at Pro Drive IT

    Most business IT systems weren’t designed for everyone to be working from home at the same time — yet that is exactly what is happening right now across the country.

    In the rush to keep businesses operational, systems have been hastily scaled up to get people working remotely, without a second thought given to security.

    Unsurprisingly, cyber criminals have pounced on this open treasure box. Already, we have seen an increase in various types of attacks — from Office 365 breaches and phishing attempts to large-scale ransomware attacks.

    These are all substantial threats in normal circumstances, but when your business is already stretched to the max, they could be just the thing to push you off the brink.

    Let’s take a look at some of the critical threats to look out for…

    Insecure video conferencing

    If you weren’t familiar with Zoom and Microsoft Teams before, we bet you are now. With everyone working from home, video conferencing has become the new norm.

    However, these applications aren’t without security issues. Over the past few weeks, we’ve seen plenty of reports of hackers infiltrating online meetings and using them to steal information.

    To stay secure on Zoom, make sure to set up a business account for employees to use and ensure they always schedule an event with a new random ID (rather than their personal meeting ID). Features such as the ‘waiting room’, ‘host-only screen sharing’ and password-protected meetings also help to maintain security.

    Teams is far more than just a video meeting solution, and there are a complex set of security requirements to consider. By default, the app offers very little security. This means people will be able to run Teams from any location or device they like and upload and download files from any of these devices.

    Are you twitching at the thought of the potential GDPR nightmare here? Fortunately, all of this can be changed in the settings.

    With any video call, it’s also important to be aware of what is on display in the background. In Zoom, you can add a virtual background, while Teams allows you to blur the background. These features should always be used to shield users’ homes from prying eyes.

    Vulnerable home networks

    Then you have the home network issues to contend with, too. Most home networks are not managed by an IT professional and do not have the same controls as a business network.

    Broadband hubs typically come with set usernames and passwords. Some are a little harder to crack than others, but either way, chances are they’ll still be using the exact same ones as the day they were delivered!

    Your employees’ homes will likely also have many devices either hard wired to their network or connected by wireless. Often, these devices will have a simple or default password. And while modern smart devices will usually update their software automatically, many older ones won’t. This could leave the devices and the network they’re connected to vulnerable — as well as your business!

    Home computers also tend to lack the most basic yet essential security measures. If there is malware on an employee’s home computer and it’s on the same network as their work computer, this could potentially compromise your business. This is why it’s essential to have good quality, paid for (free is free for a reason!) antivirus software on all computers running on the same network.

    A simple way to help get around these issues is to set up a business-managed wireless access point for staff to connect to and create a ‘virtual’ network, which will remain separate from the rest of their home.

    Because work computers are being used in a non-secure network, you also need to ensure all data being transmitted to and from the device is encrypted. To do this, you need a VPN. Hosted VPNs are more secure than office VPNs and will ensure traffic can’t be ‘snooped on’. Just make sure you set up multi-factor authentication to prevent access even if a password is breached.

    Malware-infected USBs and data loss

    On top of adding personal devices to the mix, your employees could also be tempted to use external USBs or drives to store data on. These devices can easily be populated with malware and when plugged in, place your company computers or laptops and entire business at risk.

    Usually, office-based IT systems rely on staff coming into the building from time to time to ensure any local data is synchronised with the servers. But with working from home measures likely to remain in place for quite some time, this won’t be possible — meaning the likelihood of data loss becomes much higher. If you’re not using a fully cloud-based IT system, you should at least ensure your staff can back up their data to the Cloud.

    Don’t bury your head in the sand!

    There’s a lot to think about when it comes to security and remote working — and keeping on top of everything can seem like a never-ending challenge.

    Many businesses are burying their heads in the sand or addressing the issues by resorting to using free services (as opposed to free offers from premium services). There’s a big difference! Free services usually lack the security of premium ones and can be rife with GDPR issues, so best to leave it to the pros!

    Over the coming months, cloud-based solutions will also be key to ensuring business continuity and security, and you should make it a priority to ensure everyone in your team knows how to make the best use of the technology.

    If you need outsourced IT support or advice about remote working, please contact the Pro Drive IT team today.

    More from Business

    Explore more articles in the Business category

    Image for How Commercial Lending Software Platforms Are Structured and Utilized
    How Commercial Lending Software Platforms Are Structured and Utilized
    Image for Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Image for Why More Mortgage Brokers Are Choosing to Join a Network
    Why More Mortgage Brokers Are Choosing to Join a Network
    Image for From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    Image for From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    Image for Global Rankings Revealed: Top PMO Certifications Worldwide
    Global Rankings Revealed: Top PMO Certifications Worldwide
    Image for World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    Image for Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Image for The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    Image for Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Image for Using Modern Team Management Methods to Improve Collaboration in Hybrid Work Models
    Using Modern Team Management Methods to Improve Collaboration in Hybrid Work Models
    Image for Why Email Deliverability is a Business Risk Your Company Can’t Afford to Ignore
    Why Email Deliverability is a Business Risk Your Company Can’t Afford to Ignore
    View All Business Posts
    Previous Business PostA comprehensive look at PCI Remote Assessment
    Next Business PostThe value of strong relationships