• 2022 Tech Trends Report: Work culture play

Page 13

00

01

02

03

04

05

06

07

08

09

10

11

12

13

Watch Closely

Work, Culture & Play

Informs Strategy

Act Now

2ND YEAR ON THE LIST

Home Offices Introduce New Cybersecurity Risks

Cyberattacks increasingly target home offices.

13

KEY INSIGHT

EXAMPLES

DISRUPTIVE IMPACT

EMERGING PLAYERS

As employees became accustomed to working from their own living spaces in the COVID-19 era, CISOs raised concerns that insecure and unmonitored home networks could expose companies’ proprietary data, trade secrets, video conversations, and more to hackers or industry rivals. Working from home is becoming a gateway to new forms of data theft.

In 2020, the sudden shift to remote workforces opened wide gaps in cybersecurity for companies around the globe. As we enter year three of the pandemic, cybersecurity threats continue to plague companies. According to a 2021 Deloitte survey, 25% of employees have noticed an increase in fraudulent emails, spam, and phishing attempts in their corporate email since the beginning of the COVID crisis. And a 2021 Tenable study found that 74% of organizations attribute recent cyberattacks to remote work tech vulnerabilities. In a home office setting, threats such as phishing and ransomware can more easily evade corporate defenses.

WFA is our new normal—which means that cyberattacks directed at remote workers will increase. Straightforward ways to mitigate risk and reinforce cybersecurity best practices include requiring two-factor authentication, installing anti-malware software on all machines, increasing privacy settings on home Wi-Fi networks, and even scanning video backdrops for exploitable information. Another option is to invest in cyber liability insurance. Any company that handles highly sensitive or classified materials should consider sending technicians to secure the domestic working environments of all employees with security clearances. Failure to address these vulnerabilities greatly increases the odds of a potentially devastating breach.

• Chubb • Norton 360 • Malwarebytes • Wyse

© 2022 Future Today Institute


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Disclaimer

1min
page 51

Creative Commons License

1min
pages 52-53

Key Questions

0
page 43

Trends in Action

0
page 44

Application

1min
page 42

Kids Fitness and Educational Games

1min
page 40

Protecting Little Gamers

1min
page 41

Sports Tech

1min
page 39

Scenario: What to Detect When You're Expecting

2min
page 37

Digital Addiction

1min
page 38

Play-to-Earn Gaming

1min
pages 34-35

Connected Toys

2min
page 36

Scenario: Fashion's Second-Hand News

0
page 29

eSports and Gaming

2min
page 32

Digital Beauty

2min
page 30

Upcycled and Circular Fashion

1min
page 28

Digital Fashion

2min
page 27

Psychedelics

2min
pages 25-26

Altered States

0
page 21

Cannabusiness Tech

2min
pages 23-24

The Crypto Art Market

2min
page 18

Emerging Art Experiences

1min
page 19

IP Rights in the Age of TikTok

1min
page 20

Next-Gen Gig Economy

2min
page 16

Work From Anywhere

2min
pages 11-12

Key Insights

0
page 7

Upskilling

1min
page 14

Macro Forces and Emerging Trends

4min
pages 3-4

Scenario: Hyperlocal Communities

1min
page 15

Apps Shaping the Remote Workspace

2min
page 9

Home Offices Introduce New Cybersecurity Risks

1min
page 13

Accessibility Tech

1min
page 10
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.