{"id":15630,"date":"2020-05-17T15:05:13","date_gmt":"2020-05-17T15:05:13","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=15630"},"modified":"2020-11-27T01:59:25","modified_gmt":"2020-11-27T01:59:25","slug":"home-cyber-security-resilience-wfh","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh","title":{"rendered":"How home cyber-security is impacting business cyber-resilience."},"content":{"rendered":"\n<p>We live in a work-from-home (WFH) world. And we were forced into this world <strong>rapidly<\/strong> \u2013 within weeks, businesses scrambled to adopt WFH in a fight just to stay alive.<\/p>\n\n\n\n<p>The imperative was to \u201cmake remote workers <strong>productive<\/strong>\u201d. And we\u2019ve been remarkably successful.<\/p>\n\n\n\n<p>But what about making them <strong>secure<\/strong>?<\/p>\n\n\n\n<p>You see, cyber-security and cyber-resilience just got a whole lot harder. Instead of one business network to secure, every employee\u2019s home network is a potential cyber vulnerability.<\/p>\n\n\n\n<p>Now that WFH looks likely to be more than just a temporary measure, businesses must mitigate the risks that WFH poses. Let\u2019s look at the issues.<\/p>\n\n\n\n<table style=\"padding:0px;border:none;\">\n <tr><td colspan=\"3\" style=\"text-align:center;background:#2A3439;border:none;\"><h2 style = \"color:white;margin-top:5px;\"><strong>10 second Recap<\/strong><\/h2><\/td><\/tr>\n <tr><td colspan=\"3\" style=\"text-align:center;background:#008ECE;color:white;border:none;padding:20px;\"><span style=\"font-size:16pt;\"><b>RESILIENCE<\/b><\/span><br\/><span>picking yourself up if you get struck down<\/span><\/td><\/tr>\n <tr><td style=\"background:#008ECE;border:none;width:40%;\"><\/td><td style=\"border:none;text-align:center;font-size:20pt;font-weight:bold;padding:10px;width:20%;background:#bcbec0;\">VS<\/td><td style=\"border:none;background:#193a66;width:40%;\"><\/tr>\n <tr><td colspan=\"3\" style=\"padding:10px;border:none;text-align:center;background:#193a66;color:white;padding:20px;\"><span style=\"font-size:16pt;\"><b>SECURITY<\/b><\/span><br\/><span>Trying to not get struck down in the first place.<\/span><\/td><\/tr>\n<\/table>\n\n\n\n<p>Resilience \u2013 picking yourself up if you get struck down<\/p>\n\n\n\n<p>Security \u2013 trying to not get struck in the first place Every business needs both. You can read more about this in this blog article \u2013 the differences between cyber-security and cyber-resilience, and why you need both.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Meet Johnny, your business\u2019s latest weakness<\/h2>\n\n\n\n<p>Johnny is the son of Margaret, the business\u2019s marketing manager. Like all 8-year olds, Johnny enjoys online games, and already knows how to visit websites. He even has his own computer!<\/p>\n\n\n\n<p>But did you know that Johnny is now the business\u2019s latest cyber-security weakness? Johnny\u2019s love of online games could easily be his mother\u2019s business\u2019 worst nightmare.<\/p>\n\n\n\n<p>What if:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Johnny gets lured into clicking on a bright red button that promises access to a new online game, but actually executes a malware bootstrapper instead?<\/li><li>Malware installs itself silently onto Johnny\u2019s computer. The malware then jumps to other computers on the same network, including Margaret\u2019s WFH computer.<\/li><li>A few days later, like clockwork, the malware springs to life on all infected computers, encrypting data files \u2013 including Margaret\u2019s computer.<\/li><li>Margaret\u2019s computer is set to sync files to the cloud, so the cloud copies of data get overwritten with encrypted garbage.<\/li><li>Margaret starts work by booting up her computer, only to find a ransom note.<\/li><\/ol>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-sorry-mom.jpg\" alt=\"\" class=\"wp-image-15752\" width=\"455\" height=\"303\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-sorry-mom.jpg 1000w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-sorry-mom-300x200.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-sorry-mom-768x511.jpg 768w\" sizes=\"auto, (max-width: 455px) 100vw, 455px\" \/><figcaption><strong><em>Ouch. \u201cSorry Mom!\u201d<\/em><\/strong><\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Employee home cybersecurity \u2013 an oxymoron in 5 simple facts.<\/h2>\n\n\n\n<p>The reality is that cybersecurity at home will never be as good as at work. Here are five simple facts that illustrate why.<\/p>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;border-radius:10px;\">\n  <tbody>\n   <tr>\n    <td style=\"text-align:center;width:8%;background:#F6F6F6;border:none;vertical-align:middle;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/fact-01.png\" style=\"width:100%;\"><\/td>\n    <td style=\"width:10%;background:#282561;font-weight:bold;text-align:center;color:white;border:none;\">FACT 1<\/td>\n    <td style=\"background:#008ECE;color:white;border:none;font-weight:500;\">Employees won\u2019t spend as much on network security, nor will they be configured securely.<\/td>\n    <\/tr>\n    <tr>\n     <td colspan=\"3\" style=\"background:#F6F6F6;border:none;\">Do you remember the last time that your business bought a \u201cproper\u201d firewall router? It probably was a major infrastructure investment, costing thousands of dollars for business-grade hardware \u2013 from major vendors like Cisco, HP or Dell.<br><br>What does the average employee use? Most likely, a $50 router provided by the ISP, in the factory default state. With a high probability of weak Wi-Fi passwords and admin consoles secured by credentials of \u201cadmin\u201d and \u201cpassword\u201d, we can safely assume most home networks will be easy to penetrate.\n    <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;border-radius:10px;\">\n  <tbody>\n   <tr>\n    <td style=\"text-align:center;width:8%;background:#F6F6F6;border:none;vertical-align:middle;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/fact-02.png\" style=\"width:100%;\"><\/td>\n    <td style=\"width:10%;background:#282561;font-weight:bold;text-align:center;color:white;border:none;\">FACT 2<\/td>\n    <td style=\"background:#008ECE;color:white;border:none;font-weight:500;\">Employees won\u2019t spend on business-grade AV<\/td>\n    <\/tr>\n    <tr>\n     <td colspan=\"3\" style=\"background:#F6F6F6;border:none;\">A basic investment in cyber-security also means that all desktops on an office network are protected by business-grade anti-virus (AV) and anti-malware.\n<br><br>Can the same be said every device on an employee\u2019s home network?\n<br><br>\nAV solutions aren\u2019t going to be cheap. With the highest grade business-grade AV products costing upwards of $5 per month (those with insurance policies) \u2013 designed to stop malware and other threats \u2013 what does the average employee have? Most likely, free products or nothing at all.\n    <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;border-radius:10px;\">\n  <tbody>\n   <tr>\n    <td style=\"text-align:center;width:8%;background:#F6F6F6;border:none;vertical-align:middle;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/fact-03.png\" style=\"width:100%;\"><\/td>\n    <td style=\"width:10%;background:#282561;font-weight:bold;text-align:center;color:white;border:none;\">FACT 3<\/td>\n    <td style=\"background:#008ECE;color:white;border:none;font-weight:500;\">A business has no control over the clicking habits of employees\u2019 children<\/td>\n    <\/tr>\n    <tr>\n     <td colspan=\"3\" style=\"background:#F6F6F6;border:none;\">With so many ransomware and phishing attacks based on social engineering, one hapless click can leave you with major problems.\n<br><br>\nAnd while adults get tricked often enough, what about children? All they need is to click on a colorful bright button, promising a free online game, in order to be compromised.\n<br><br>\nEven if children use their own device, malware can spread across a network and infect WFH machines. Suddenly, corporate business risk now depends on whether a child clicks on a malicious button!\n    <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;border-radius:10px;\">\n  <tbody>\n   <tr>\n    <td style=\"text-align:center;width:8%;background:#F6F6F6;border:none;vertical-align:middle;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/fact-04.png\" style=\"width:100%;\"><\/td>\n    <td style=\"width:10%;background:#282561;font-weight:bold;text-align:center;color:white;border:none;\">FACT 4<\/td>\n    <td style=\"background:#008ECE;color:white;border:none;font-weight:500;\">Home networks have more IoT devices<\/td>\n    <\/tr>\n    <tr>\n     <td colspan=\"3\" style=\"background:#F6F6F6;border:none;\">Given that IoT devices are notorious for security vulnerabilities, it makes little sense for a business to have \u201csmart devices\u201d. Or if a business does, they are likely to be connected to a separate subnet, away from the main company network.\n<br><br>\nBut what about home environments? Everyday people love to connect IP security cameras, thermostats, lights, smart TVs, smart fridges and toasters to the home WiFi. And almost certainly, those potentially insecure devices will be on the same network as work-from-home computers.\n    <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<figure class=\"wp-block-table\">\n <table style=\"border:none;border-radius:10px;\">\n  <tbody>\n   <tr>\n    <td style=\"text-align:center;width:8%;background:#F6F6F6;border:none;vertical-align:middle;\"><img decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/fact-05.png\" style=\"width:100%;\"><\/td>\n    <td style=\"width:10%;background:#282561;font-weight:bold;text-align:center;color:white;border:none;\">FACT 5<\/td>\n    <td style=\"background:#008ECE;color:white;border:none;font-weight:500;\">it\u2019s almost impossible for a business to know the  history of employee-owned machines and devices.<\/td>\n    <\/tr>\n    <tr>\n     <td colspan=\"3\" style=\"background:#F6F6F6;border:none;\">We know that some WFH environments will have employee-owned machines, whereas others will have company-supplied laptops.\n<br><br>\nBut it\u2019s almost guaranteed that WFH machines will be sharing the same network as personal machines and devices.\n<br><br>\nLet\u2019s talk about the past history of all these personal devices:\n<br>\n<ul>\n<li>Have they applied all security updates?<\/li>\n<li>Are they all running modern operating systems?<\/li>\n<li>Has the device or machine ever been connected to free Wi-Fi?<\/li>\n<li>Has anyone who has ever used the machine clicked on a malicious link or button?<\/li><\/ul>\nSecurity professionals will always assume that a machine with an unknown history is compromised. That\u2019s a safety precaution \u2013 like a news anchor assuming every microphone is live, or a farmer assuming every gun is loaded.\n<br>\nOn that basis, every employee will have compromised networks! By now, it should be clear that home cyber-security is a major headache for businesses.\n    <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">So does it really matter? Lessons from COVID-19<\/h2>\n\n\n\n<p>It should be clear that home networks and work from home arrangements are a real, present risk for all businesses.<\/p>\n\n\n\n<p>And it should also be clear that ensuring the cyber security of such home networks is going to be extremely difficult.<\/p>\n\n\n\n<div style=\"padding:20px;background:#008ECE;text-align:center;font-size:20pt;color:white;font-weight:300;\"><b>The question<\/b>: Does it really matter? And what do I do next?<\/div><br>\n\n\n\n<p>The answer is surprisingly similar to the COVID-19 situation.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Do the best you can to try not to catch it. (Easy \u2013 follow social distancing guidelines)<\/li><li>Prepare so that even if you catch it, you can recover and survive. (Hard \u2013 make sure you don\u2019t have co-morbidities.)<\/li><\/ol>\n\n\n\n<p>In the cyber-world, it\u2019s just reversed.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Do the best you can to not get cyber attacked. (Hard \u2013 as we\u2019ve discussed, home cyber-security can be an oxymoron).<\/li><li>Prepare so even if you get attacked, you can recover. <\/li><\/ol>\n\n\n\n<div style=\"padding:20px;background:#008ECE;text-align:center;font-size:20pt;color:white;font-weight:300;\">It&#8217;s easy \u2013 keep backups and\/or have a disaster recovery plan.<\/div><br>\n\n\n\n<p>In my next article, I\u2019ll look at whether backups are truly necessary, and in what circumstances they\u2019ll be useful. Believe it or not, it varies depending on each business\u2019 circumstances, and not every business needs to back up WFH machines. However, for many businesses, it\u2019s certainly a good idea.<\/p>\n\n\n\n<p>Until next time, I wish you good health during these challenging times.<\/p>\n\n\n\n<p>Article 2: When do you need to back up WFH machines?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live in a work-from-home (WFH) world. And we were forced into this world rapidly \u2013 within weeks, businesses scrambled to adopt WFH in a fight just to stay alive.<\/p>\n","protected":false},"author":17,"featured_media":15936,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[766,757],"tags":[],"class_list":["post-15630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-wfh","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How home cyber-security is impacting business cyber-resilience. - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How home cyber-security is impacting business cyber-resilience. - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"We live in a work-from-home (WFH) world. And we were forced into this world rapidly \u2013 within weeks, businesses scrambled to adopt WFH in a fight just to stay alive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-17T15:05:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-27T01:59:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"993\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"How home cyber-security is impacting business cyber-resilience.\",\"datePublished\":\"2020-05-17T15:05:13+00:00\",\"dateModified\":\"2020-11-27T01:59:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\"},\"wordCount\":1156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg\",\"articleSection\":[\"BackupAssist WFH\",\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\",\"url\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\",\"name\":\"How home cyber-security is impacting business cyber-resilience. - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg\",\"datePublished\":\"2020-05-17T15:05:13+00:00\",\"dateModified\":\"2020-11-27T01:59:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg\",\"width\":1500,\"height\":993},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How home cyber-security is impacting business cyber-resilience.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How home cyber-security is impacting business cyber-resilience. - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh","og_locale":"en_US","og_type":"article","og_title":"How home cyber-security is impacting business cyber-resilience. - Cyber Resilience Blog","og_description":"We live in a work-from-home (WFH) world. And we were forced into this world rapidly \u2013 within weeks, businesses scrambled to adopt WFH in a fight just to stay alive.","og_url":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh","og_site_name":"Cyber Resilience Blog","article_published_time":"2020-05-17T15:05:13+00:00","article_modified_time":"2020-11-27T01:59:25+00:00","og_image":[{"width":1500,"height":993,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"How home cyber-security is impacting business cyber-resilience.","datePublished":"2020-05-17T15:05:13+00:00","dateModified":"2020-11-27T01:59:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh"},"wordCount":1156,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg","articleSection":["BackupAssist WFH","Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh","url":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh","name":"How home cyber-security is impacting business cyber-resilience. - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg","datePublished":"2020-05-17T15:05:13+00:00","dateModified":"2020-11-27T01:59:25+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-1.jpg","width":1500,"height":993},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/home-cyber-security-resilience-wfh#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How home cyber-security is impacting business cyber-resilience."}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=15630"}],"version-history":[{"count":116,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15630\/revisions"}],"predecessor-version":[{"id":16711,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15630\/revisions\/16711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/15936"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=15630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=15630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=15630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}