How safely do you work from home?
When almost everyone is working from home, the risk of information leaks increases exponentially. One of the reasons for this is that companies continue to rely on passwords as the only security measure for logging into their systems. Given that cyber-attacks have become more sophisticated and tougher to trace, it is more important than ever to tackle this problem.
When a company’s information moves outside the physical buildings, firewalls and IT systems, its security becomes totally dependent on individual users and the computers they take with them. An unprotected computer connected to the internet is subjected on a daily basis to attacks by malicious software designed to seek out security loopholes through which it can gain access to systems and steal passwords.
Modern people require modern solutions
This challenge does not arise exclusively in crisis situations such as the coronavirus pandemic. In modern society, it is becoming increasingly common – and more and more important – to allow people to work when and where they want to. And now that we are working more and more often away from our offices and outside our own security solutions, the risks are naturally increasing. The huge diversity of networks, connections and devices such as smartphones and laptops, is making new demands on the person and system(s) tasked with guaranteeing security.
The boundary between what is private property and the employer’s quality assured equipment is becoming increasingly blurred, and more and more people are using their own equipment and connections to access work material in their jobs. This inevitably increases the risk of confidential and sensitive information finding its way into hackers’ hands. What is more, the problem can affect anyone, given that modern attacks are largely automated.
The modern solution is to eliminate the use of passwords
Two-factor login applies an extra layer of security by making it harder for unauthorised parties to access someone’s accounts and information, because it is not sufficient to have acquired this person’s password. It takes more than that to gain access.
Trustworthy identity management and two-factor login are crucial to establishing security in our IT systems. However, the technology often needs to meet user requirements for simplicity, too.
Read the full debate article (in Swedish) in Svenska Dagbladet, where Jonas Öholm, a member of our team, discusses the issue in more depth.