Thursday, January 21, 17:36
Home security Remote employees open suspicious emails despite security risks

Remote employees open suspicious emails despite security risks

Remote employees are increasingly putting themselves at risk corporate data and systems, as they do not follow the safety of best practices, according to new research Mimecast. The email security provider conducted a survey of more than 1.000 employees worldwide using corporate Appliances, to write his latest report, entitled "Company-issued computers: What are employees really doing with them?".

The results of the survey are discouraging, as they reflect the refusal of employees to follow the proposed safety practices. Particularly, 73% of respondents frequently use a device provided by the company for personal matters, such as email control (47%), financial transactions (38%) and online markets (35%). The survey also showed that, although most (96%) respondents said they were aware of the effects of clicking on malware Phishing links, about half (45%) open emails that they consider suspicious.

Remote employees open suspicious emails despite security risks

This is despite the fact that 64% claimed to have received a special education on its field cyber security, so as not to be exposed to potential hazards during remote work. In addition, half (45%) admitted that they did not report such emails to their company's IT teams.

Michael Madon, senior vice president of awareness education and threat intelligence at Mimecast, has argued that corporate behavior change efforts are failing.

Remote employees open suspicious emails despite security risks

The research findings coincide with those published by Trend Micro in a report earlier this year, which found that 39% of remote workers have access to corporate data through personal devices and 36% of these devices do not even have the basics protection with password. The report also noted that half (52%) of remote workers have devices and production connected to their home network, which could expose them to additional security risks.


Please enter your comment!
Please enter your name here

Every accomplishment starts with the decision to try.



Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...

Microsoft: "Zero trust" protects against sophisticated hacking attacks

According to Microsoft, the techniques used by the hackers of SolarWinds, were sophisticated but common and preventable. To avoid future attacks ...