Close this search box.

Remote Working: The Cyber Threat Landscape

Table of Contents

[fusion_builder_container type=”flex” hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” border_sizes_top=”” border_sizes_bottom=”” border_sizes_left=”” border_sizes_right=”” first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” content_alignment_medium=”” content_alignment_small=”” content_alignment=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” margin_top=”” margin_right=”” margin_bottom=”” margin_left=”” font_size=”” fusion_font_family_text_font=”” fusion_font_variant_text_font=”” line_height=”” letter_spacing=”” text_transform=”none” text_color=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Due to the current Coronavirus outbreak, we’re seeing an increase in businesses permitting their staff to work from home. Flexible working is becoming the norm and the business landscape is changing rapidly as a result, but so is the Cyber Threat Landscape! BEWARE!

This raises its own issues when it comes to cyber security. For example, is their equipment up to scratch, or are they resorting to more powerful home computing devices? And if staff are using personal devices for work, do these offer the same protections?

What is happening to the data held on your office servers? Is it accessible to all from home, and is it still being backed up effectively?

These are the just a couple of the things you need to be thinking about.

What does the cyber threat landscape look like?

Well, as we have written about recently, we have observed a significant increase in the number of phishing attacks. Phishing is a popular tool of the cyber criminal, even without the current global situation, but it has become even more prevalent since the outbreak of COVID-19.

Cyber Threat LandscapeCampaigns are leveraging the panic and genuine concern surrounding COVID-19, with communications spoofing or impersonating trusted sources such as the Government, schools, local councils, and more. This is on top of the increase in fake news on social media platforms surrounding ‘miracle cures’ and the origin of the disease, amongst others.

With staff either in self-isolation, or working remotely due to government advice, impersonation emails are particularly effective. For example, criminals are taking advantage of businesses without effective communication channels by posing as key decision-makers and asking for ‘payments’ to be made, or passwords to be reset.

In other channels, COVID-19 ‘maps’ are proving a common method of disseminating malware. It’s approximated that between 50-80% of these websites contain the potential to distribute malware, so please be careful of these. If you’re curious, please use the case map set up by Public Health England.

What are the solutions?


Use multi-factor authentication (MFA) for every service or software that is internet-facing – this protects against 99% of account hacks!

End User Training

Train your staff on cyber security best practices – this will help them spot dubious activity including phishing.

Email Security

Email security will protect you against most phishing attempts. If it includes email continuity, you’ll also be able to access your emails in the event of an outage.

Collaboration and Communication

Cyber criminals rely on confusion to execute phishing attacks. Use collaboration software like Microsoft Teams to keep in touch with your colleagues. Doing so means strength in numbers – it’s also an important means ensuring good morale and mental health.

Reliable, Secure Equipment and Software

Provide your team with the means to do their job effectively whilst working remotely. People will always look for short cuts, and if that means using a different device because their current one falls short of their needs, they will, putting you at risk.

Cloud backup services

It goes without saying that having a backup and business continuity plan is just as important – arguably more so – whilst working from home. Does your current data backup plan accommodate remote workers?

Regular Patching

Ensure that all devices are patched and kept up to date; this will keep your devices secure against the latest threats. Either administer these updates centrally or provide clear instruction on how your team can do this.

If you’re not sure where to start with these, please do not hesitate to get in touch on 01283 753 333 or via email at


In the meantime, we’ve compiled some resources to help you adjust to remote working, and to keep you safe.


Want to keep up with our blog?

Get our most valuable tips right inside your inbox, once per month!

Latest IT News & Insights
Work Password Example - why you need a password manager
The most hacked passwords in 2024 and how to protect yourself
These are the most hacked passwords in 2024, learn today how you can protect your business and foster...
Read More
Early patching in Cyber Security
The Importance of Early Patching
Combat against cyber threats with early patching in cyber security.
Read More
Zero Patch updates - Cyber security vulnerability spotted - Neuways urge businesses to act.
Biggest Microsoft Patch Tuesday in years fixes four zero-days, five critical bugs
Discover how the latest Microsoft Patch Tuesday update addresses 142 vulnerabilities, including four...
Read More
Cyber security offered by Neuways in Derby
Businesses pressing ahead with AI regardless of Concerns
Businesses are ignoring concerns re: AI for data tracking. Neuways advise on how to foster a cyber security...
Read More
What is Credential Stuffing and how can it affect your business?
Defend your business against credential stuffing attacks thanks to Managed Cyber Security services from...
Read More
Cyber secure culture within the business
6 ways to foster a Cyber Secure culture within your company
95% of cyber security issues traced to human error. Here is how to foster a cyber secure culture within...
Read More
Apple devices holding company data could be a security flaw in your business. Photo by Aurich Lawson.
Why it's important to control what apps go into devices that hold company data
If you supply employees with work devices holding company data, managers need to be able to control what...
Read More
Beware of Fake Free WiFi netowrks.
Beware of Fake Free WiFi Networks
Fake free WiFi networks allow cyber criminals to gain access and steal personal data. Use a secure WiFi...
Read More

Frequently Asked Questions

As a leading IT and technology provider, we offer three core services, all of which have additional add-ons. We offer Managed IT Support, Business Central implementation and consultation, as well as Managed Cyber Security. Call us on 01283 753333 if you are interested in any of our services.

Contact us

Support: 01283 753300

Business Development: 01283 753333

Purchasing: 01283 753322

Admin and Accounts: 01283 753311


Managed IT support is a comprehensive solution where an expert IT provider, like Neuways, handles your technology infrastructure. This includes proactive monitoring, maintenance, cyber security, and support.

Yes we do. Your business needs Cyber Security due to the increasing number of cyber threats that are affecting businesses in all industries. If your business has data and technology systems implemented, you will need Managed Cyber Security.

We can help you conduct Cyber Audits to assess whether your business would gain Cyber Essentials and Cyber Essentials Plus Certification. Our dedicated departments work with your team to assess how much work is required before you gain Cyber Essentials Plus certification. We will then provide advice and consultation on what aspects you need to change within your business before providing a quote on how we can assist your company become Cybersafe.

Yes we can. We have our own dedicated Microsoft Dynamics 365 Business Central teams who work to ensure that we can implement the right systems and solutions into your website that are absolute right for you. Our experienced business consultants have worked all over the world for organisations operating on a global scale. 

Exclaimer Pro is a dynamic email signature that helps clients to switch and change around email signatures so that clients are able to advertise different offers and brands to a variety of email recipients. Administrators can also manage user emails internally, meaning the user does not have to touch their own email signature.

We offer Managed Security Training to help employees spot email phishing attacks, spear phishing attacks and vishing attacks. We also help train clients on how to use the various pieces of software we provide to clients, like Exclaimer Pro, Business Central and Cybersafe software.

We are a Managed IT Support provider based in Derby, East Midlands. However, we cover so many areas including the whole of the UK, Europe, and America. We are always willing to travel and send our expert technicians to ensure you have the best experience. 

Got a question?

Reach out
& Connect

Please enable JavaScript in your browser to complete this form.