{"id":28850,"date":"2020-11-12T07:34:22","date_gmt":"2020-11-12T13:34:22","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=28850"},"modified":"2021-01-05T00:29:26","modified_gmt":"2021-01-05T06:29:26","slug":"security-risks-during-remote-working-and-how-to-address-them","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/","title":{"rendered":"Security Risks During Remote Work and How to Address Them"},"content":{"rendered":"<div class=\"q-text\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-28853\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2020\/11\/Remote-work-security.jpg\" alt=\"\" width=\"5081\" height=\"3387\"><\/p>\n<p>\u00a0<\/p>\n<p class=\"q-text qu-display--block\">Working from home increases the risks of critical data theft, especially if you are using your personal laptop for the work and not a company-issued one.<\/p>\n<p class=\"q-text qu-display--block\">Generally, people use personal laptops with a casual attitude, without worrying about unnecessary services running on it. Unwanted ports open to the internet, with different torrent clients, cracked software, and unpatched OS. Moreover, people do not hesitate to use any random software on their personal laptops. These increase the risks of malware infection and data theft. Most of these things are taken care of in a company laptop, as IT teams take care of these basic IT hygiene practices while configuring official laptops.<\/p>\n<p class=\"q-text qu-display--block\">The second possible attack surface during WFH is other internet-connected devices to our home WiFi. A poorly configured WiFi router at our home or an infected home laptop connected to the same WiFi which we are using for work from home can pose major security risks.<\/p>\n<p>Business activities that were once conducted in protected office environments, and monitored under specific policies, have quickly transitioned to new, and potentially less secure territory. For example, customer service agents who worked in closely managed call centers are now managing sensitive customer data at home.<\/p>\n<p>The rapid shift to working from home has also changed the ways many organizations do business from moving face-to-face meetings to video conferencing calls to adding new collaboration tools\u2014yet the survey showed many employees are lacking guidance, direction, and policies.<\/p>\n<p>Allowing employees to access company data from offsite locations raises concerns about data encryption, the security of wireless connections, the use of removable media, and potential loss or theft of devices and data. In a 2018 survey by Wi-Fi security company iPass, 57% of CIOs reported they suspect their mobile workers had been hacked or were the cause of security problems. Very few companies are confident that their remote employees used virtual private networks (VPNs) to increase security when connecting to company networks. Sixty-two percent of security incidents related to Wi-Fi connections happen when employees use networks in cafes or coffee shops, and 27% of workers in the U.S. admit to opening emails and attachments from unfamiliar senders. Devices are often compromised as a result, putting both personal and company data at risk.<\/p>\n<p>Cybercriminals are taking advantage of fear surrounding COVID-19 and using it to accelerate attacks against organizations, primarily with COVID-themed phishing emails. In response, it is necessary for companies to take sufficient measures to inform employees and set up policies that will help protect the confidentiality and integrity of their information as well as maintain the availability of their systems for remote employees.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#End-Point_Protection_for_Home_Users\" title=\"End-Point Protection for Home Users\">End-Point Protection for Home Users<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Risk-Free_Remote_Access\" title=\"Risk-Free Remote Access\">Risk-Free Remote Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Multiple_Factor_or_2_Factor_Authentication\" title=\"Multiple Factor or 2 Factor Authentication\">Multiple Factor or 2 Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Use_VPN_for_Critical_Access\" title=\"Use VPN for Critical Access\">Use VPN for Critical Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Set_Up_Firewall_and_AntiVirus\" title=\"Set Up Firewall and AntiVirus\">Set Up Firewall and AntiVirus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Back_Up_Your_Data\" title=\"Back Up Your Data\">Back Up Your Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Passwords_and_Cloud_Security\" title=\"Passwords and Cloud Security\">Passwords and Cloud Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#Update_Acceptable_Use_Policies_for_Employees\" title=\"Update Acceptable Use Policies for Employees\">Update Acceptable Use Policies for Employees<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"End-Point_Protection_for_Home_Users\"><\/span><strong>End-Point Protection for Home Users<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Modern <a href=\"https:\/\/deltarisk.com\/blog\/considering-next-gen-endpoint-security-where-to-start\/\">endpoint detection and response (EDR) solutions<\/a> are designed to operate outside the corporate network. These solutions prevent malware and enable threat hunting. They also give you the ability to initiate immediate response actions, such as preventing new malware from running or removing malware from systems. Building a secure endpoint ecosystem is the need of the hour. Hackers want to compromise any and every device because cybercrime is a booming business to siphon billions. As wireless endpoint devices inch closer to acting as corporate infrastructure in the current remote work scenario, debunking the myth that wireless hijacking cannot be done across remote geographic locations becomes more critical.<\/p>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"Risk-Free_Remote_Access\"><\/span><strong>Risk-Free Remote Access<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Many business owners don\u2019t understand the requirements for a robust remote access policy. Access needs and practices are changing among all workers, not just remote employees, and professional guidance is becoming essential to prevent serious problems like identity theft, data breaches, and data loss.<\/p>\n<p>IT and cybersecurity professionals can evaluate the security risks companies face and develop customized protocols to minimize these risks, but 44% of companies aren\u2019t bringing the pros in to help. Therefore, many executives may miss key insights into potential vulnerabilities and fail to implement proper protection for remote workers.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Multiple_Factor_or_2_Factor_Authentication\"><\/span><strong>Multiple Factor or 2 Factor Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>2FA or Multi-Factor Authentication is one of the best solutions to the standard single sign-on method. It requires that your users present multiple pieces of evidence to verify their identity. An example of this would be answering a question like \u201cwhere did you go to school?\u201d and then entering your ID and password to gain access to the remote access software. Just adding a simple question like this can greatly enhance your security. You could take it a step further and require your outside vendors to call your operations department in order to acquire a single-use passcode to remotely access your data, in addition to using their private ID and password.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Use_VPN_for_Critical_Access\"><\/span><strong>Use VPN for Critical Access<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Many corporate departments like Finance and Human Resources may be handling sensitive data outside the physical office for the first time. Employees who are still traveling for urgent or mission-critical business may be working from a coffee shop or hotel on their mobile devices. Requiring them to use a VPN will ensure that data stays private and that these systems are not exposed externally.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Set_Up_Firewall_and_AntiVirus\"><\/span><strong>Set Up Firewall and AntiVirus<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Firewalls act as a line defense to prevent threats entering your system, They create a barrier between your device and the internet by closing ports to communication. This can help prevent malicious programs entering and can stop data leaking from your device.Your device\u2019s operating system will typically have a built-in firewall. In addition hardware firewalls are built in to many routers. Just make sure that yours are enabled.<\/p>\n<p>Although a firewall can help, it\u2019s inevitable that threats can get through. A good antivirus software can act as the next line of defense by detecting and blocking known malware. Even if malware does manage to find its way onto your device, an antivirus may be able to detect and in some cases remove it.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Back_Up_Your_Data\"><\/span><strong><span id=\"8_Back_up_your_data\">Back Up Your Data<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Clearly, there are plenty of reasons to keep your data backed up. While hardware backups are still an option, one of the most convenient and cost-effective ways to store your data is in the cloud. Cloud backup services come with a wealth of options enabling you to customize your backup schedule and storage options.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Passwords_and_Cloud_Security\"><\/span><strong>Passwords and Cloud Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>It is essential that you implement two-step verification for all your users. In the most basic form, a person enters their username and password, and then their phone receives a text message with a code they enter to finish the login process. Other options for the second step include phone callbacks, physical USB hardware token keys, authentication apps on phones, and one-tap login solutions. Common choices include YubiKey, Authy, Duo, Google Authenticator, Microsoft Authenticator, and RSA SecurID.*<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Update_Acceptable_Use_Policies_for_Employees\"><\/span><strong>Update Acceptable Use Policies for Employees<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Finally, ensure your acceptable computer use policies cover employees\u2019 home computer assets. If this wording is not already there, you\u2019ll need to quickly get up to speed in allowing employee\u2019s personal assets be used for remote access. Now is an important time to remind employees that while they work remotely, they have to maintain the same level of professionalism when it comes to secure and sensitive data as they do in the office. That includes reminding people that personal email is not to be used in an official capacity and that any physical documents kept at home must either be disposed of properly with a shredder or set aside to be shredded later.<\/p>\n<p>To reduce the vulnerabilities associated with public Wi-Fi networks, employers can:<\/p>\n<p>\u2022 Ban the use of unsecured wireless connections<br \/>\n\u2022 Use geolocation to restrict the places from which company networks can be accessed<br \/>\n\u2022 Set up and require the use of a VPN for remote work<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 Working from home increases the risks of critical data theft, especially if you are using your personal laptop for the work and not a company-issued one. Generally, people use personal laptops with a casual attitude, without worrying about unnecessary services running on it. Unwanted ports open to the internet, with different torrent clients, cracked [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[72],"tags":[708,1107,1523,1348,97],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Risks During Remote Work and How to Address Them - FileCloud blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Risks During Remote Work and How to Address Them\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Working from home increases the risks of critical data theft, especially if you are using your personal laptop for the work and not a company-issued one. Generally, people use personal laptops with a casual attitude, without worrying about unnecessary services running on it. Unwanted ports open to the internet, with different torrent clients, cracked [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-12T13:34:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-05T06:29:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2020\/11\/Remote-work-security.jpg\" \/>\n<meta name=\"author\" content=\"Team FileCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team FileCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\"},\"author\":{\"name\":\"Team FileCloud\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\"},\"headline\":\"Security Risks During Remote Work and How to Address Them\",\"datePublished\":\"2020-11-12T13:34:22+00:00\",\"dateModified\":\"2021-01-05T06:29:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\"},\"wordCount\":1273,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"2FA\",\"Antivirus\",\"Firewall\",\"Remote Work\",\"VPN\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\",\"name\":\"Security Risks During Remote Work and How to Address Them - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2020-11-12T13:34:22+00:00\",\"dateModified\":\"2021-01-05T06:29:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Risks During Remote Work and How to Address Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\",\"name\":\"Team FileCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"caption\":\"Team FileCloud\"},\"sameAs\":[\"http:\/\/www.filecloud.com\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Risks During Remote Work and How to Address Them - FileCloud blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/","og_locale":"en_US","og_type":"article","og_title":"Security Risks During Remote Work and How to Address Them","og_description":"\u00a0 Working from home increases the risks of critical data theft, especially if you are using your personal laptop for the work and not a company-issued one. Generally, people use personal laptops with a casual attitude, without worrying about unnecessary services running on it. Unwanted ports open to the internet, with different torrent clients, cracked [&hellip;]","og_url":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2020-11-12T13:34:22+00:00","article_modified_time":"2021-01-05T06:29:26+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2020\/11\/Remote-work-security.jpg"}],"author":"Team FileCloud","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Team FileCloud","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/"},"author":{"name":"Team FileCloud","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935"},"headline":"Security Risks During Remote Work and How to Address Them","datePublished":"2020-11-12T13:34:22+00:00","dateModified":"2021-01-05T06:29:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/"},"wordCount":1273,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["2FA","Antivirus","Firewall","Remote Work","VPN"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/","url":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/","name":"Security Risks During Remote Work and How to Address Them - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2020-11-12T13:34:22+00:00","dateModified":"2021-01-05T06:29:26+00:00","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/security-risks-during-remote-working-and-how-to-address-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Risks During Remote Work and How to Address Them"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935","name":"Team FileCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","caption":"Team FileCloud"},"sameAs":["http:\/\/www.filecloud.com"],"url":"https:\/\/www.filecloud.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/28850"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=28850"}],"version-history":[{"count":4,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/28850\/revisions"}],"predecessor-version":[{"id":29327,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/28850\/revisions\/29327"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=28850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=28850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=28850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}