Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

3/23/2021
10:15 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

PC Matic Survey: One Year After Onset of COVID-19 Pandemic, Employer Work from Home Cybersecurity Practices Remain Inadequate

Myrtle Beach, SC – Today, American cybersecurity firm, PC Matic, announced the release of its second annual report analyzing trends between cybersecurity and employees who are working from home amidst the COVID-19 pandemic.

A follow up to research released by the firm in May 2020, the eleven-page report bears the name COVID-19: Cybersecurity in the Remote Workforce and presents the results of a nationally distributed survey by which nearly 6,000 individuals responded. The findings, gathered in March 2021, indicate that nearly one year after the onset of the COVID-19 pandemic, nearly 35% of Americans are still working from home. This, all while ransomware attacks, many of which were successfully executed by targeting remote workers, saw a near 435% increase last year.

Key findings from the report are as follows:

  • Nearly half of employers continue to fall short on providing remote workers with technical assistance. In 2020, 47% of respondents indicated they were not receiving technical assistance from their employer. In 2021, this number ticked up slightly to 49% of remote workers responding that they were not receiving technical assistance from their employer.
  • Six of every ten remote workers are using a personal device for work purposes. Nearly 62% of remote workers in both 2020 and 2021 indicated that their employer didn’t issue a device (computer, tablet, etc.) for work purposes, and instead required they use their personal devices.
  • Less than ten-percent of respondents were provided an antivirus software solution for the personal device they use for work purposes. In 2020, 7% of respondents who use their personal devices for work purposes responded that their employer provided them with an antivirus solution. In 2021, 9% responded in the same manner.

“Work from home is here to stay,” said Rob Cheng, CEO and Founder of PC Matic. “As threat-actors continue to target remote workers, and as the number of ransomware attacks continues to surge, it is imperative that employers take these threats seriously. The time is now to educate employees of the risks and to invest in proactive solutions designed to thwart these modern day threats.”

More findings and the complete report may be found here

More information on PC Matic may be found here.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27394
PUBLISHED: 2021-04-16
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.19), Mendix Applications using Mendix 8 (All versions < V8.17.0), Mendix Applications using Mendix 8 (V8.12) (All versions < V8.12.5), Mendix Applications using Mendix 8 (V8.6) (All versions <...
CVE-2020-9667
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to to plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction.
CVE-2020-9668
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Improper Access control vulnerability when handling symbolic links. An unauthenticated attacker could exploit this to elevate privileges in the context of the current user.
CVE-2020-9681
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
CVE-2021-26830
PUBLISHED: 2021-04-16
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.