Recent figures from the UK Labour Force Survey have revealed that over 25% of the UK workforce have taken advantage of the capability to work at home, and Datamonitor recently suggested that 2005 will see 40 million Europeans working from home with the UK leading the trend with 8.3 million home workers. The percentage of the UK workforce regularly using mobile devices such as laptops will undoubtedly dwarf this number, as organisations capitalise on the business benefits mobile working provides. However, with this liberation comes an associated security risk.
The ability for a company to enforce corporate security policy diminishes severely once a computer is used outside of the office. For example, if a worker takes a company laptop for a week, who is responsible for ensuring that corporate security policy is followed when the machine is being used? It is very rare to find an employee who knows what the company security policy is, not to mention understands what the implications might be if it is not followed. So who is going to warn the worker when they forget to upload a critical patch, or decide to disable the anti-virus from time to time, or use an unauthorised instant messaging application, or load games and songs? Who is going to be able to stop the employee’s children from using the laptop to trade files over peer-to-peer software?
The answer, of course, is no one. The user will likely be unaware of the many security threats that are out there, such as spyware, Trojan horses, viruses and worms. They will also be blissfully ignorant of the fact that the next time the device connects to the corporate network the security threat will be passed on to the company.
The cost of network security failure cannot be ignored. Cybercrime cost UK businesses hundreds of millions of pounds in downtime, remediation costs and lost business last year. For example, the Sasser worm that was unleashed at the end of April last year crashed hundreds of thousands of computers worldwide after rapidly spreading over the internet. Sasser did not require users to receive an e-mail message or open a file to be infected. Instead, just having a vulnerable Windows machine connected to the internet was enough to get infected.
Most organisations understand that there are numerous security threats in the wild and have developed and written security policies in an attempt to preserve the integrity of their network, but how many are actually able to enforce the policy? If most employees are unaware of what the company security policy is, let alone understand how to enforce it, then there should be an alternative method of enforcing policy where the ‘security thinking’ is not the responsibility of each and every worker.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.