{"id":3742,"date":"2020-08-19T21:51:00","date_gmt":"2020-08-19T21:51:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3742"},"modified":"2026-01-25T08:00:22","modified_gmt":"2026-01-25T08:00:22","slug":"post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be","title":{"rendered":"Post-Covid-19 and Remote Working Cyber Attacks"},"content":{"rendered":"\n<p>Long story short? You\u2019re not as worried as you should be.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comfort: 1, Security: 0<\/h2>\n\n\n\n<p>When it comes to the far-reaching effects of Covid-19, it would seem there is misalignment between the likelihood of&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;being a major contributor to the global fallout, versus how concerned people are about them.<\/p>\n\n\n\n<p>As the global pandemic continues to force governments to order lockdowns, close workplaces and impose social distancing rules, working from home has become the widely accepted way to operate for many businesses \u2013 and that fact is unlikely to change within the next few years.<\/p>\n\n\n\n<p>But while it\u2019s all very well for you and I to roll out of bed, put a shirt on over our PJ\u2019s, slide into some slippers and have a work meeting from the cosiness of our own living rooms, gaining comfort in one area almost always means it\u2019s been traded up in another.<\/p>\n\n\n\n<p>In the case of working from home, comfort replaces cyber security \u2013 and that\u2019s a problem.<\/p>\n\n\n\n<p>Particularly when statistics show how little people think it is.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Drop Everything and Go Remote. Literally.<\/h2>\n\n\n\n<p>The migration to remote working has been put into action among organisations at an increasing rate over the years as technology has advanced and the possibilities to do so have arisen.<\/p>\n\n\n\n<p>What Covid-19 has done is forced this change to happen much more abruptly than it would have minus-pandemic, leading to the hasty uprooting of the workforce from a central place to various remote locations, which in turn has lead to disorganisation among the workforce and sudden security holes in the IT network.<\/p>\n\n\n\n<p>A&nbsp;<a href=\"https:\/\/www.carbonblack.com\/wp-content\/uploads\/VMWCB-Report-GTR-Extended-Enterprise-Under-Threat-Global.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">report published in June by VMware Carbon Black<\/a>&nbsp;revealed the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>85%<\/strong>&nbsp;of chief technology, information and security officers did not believe that their workforce had been adequately equipped to work from home.<\/li>\n\n\n\n<li><strong>28%<\/strong>&nbsp;said \u201csevere and significant\u201d security gaps were the reasons behind this belief.<\/li>\n<\/ul>\n\n\n\n<p>As unsettling as these percentages are, we can hardly be surprised.<\/p>\n\n\n\n<p>You know how in horror movies, as soon as the characters split up, they start getting picked off one by one? Yeah. It\u2019s a thing.<\/p>\n\n\n\n<p>With the abrupt move to working from home, 25,000 secure endpoints at a single location can turn into 25,000 insecure devices spread far and wide with little to none of the protection they were afforded within the office.<\/p>\n\n\n\n<p>Company-wide firewalls, VPNs, blacklisted IP addresses, data encryption, antivirus software and other security measures and policies are now gone as workers switch to using inadequately protected personal devices, potentially on insecure Wi-Fi networks.<\/p>\n\n\n\n<p>A workforce using personal devices are more likely to partake in risky activity that they usually wouldn\u2019t while working at the office \u2013 activity that could impact their entire organisation; but because they\u2019re remote, visibility of what activity they\u2019re doing is limited or gone altogether.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u201cA Chain is Only as Strong as its Weakest Link\u201d<\/h2>\n\n\n\n<p>As the saying goes.<\/p>\n\n\n\n<p>In this case, that translates to: one weakly-guarded device in the home office that has access to the company network is all it takes for a cyber attack to compromise the entire organisation.<\/p>\n\n\n\n<p>Cyber criminals are well aware of this, which is why&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;have risen throughout the scramble to secure remote access points during the shift to working from home.<\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.carbonblack.com\/wp-content\/uploads\/VMWCB-Report-GTR-Extended-Enterprise-Under-Threat-Global.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">VMware Black Carbon report<\/a>&nbsp;found the following of the past 12 months:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>90%<\/strong>&nbsp;of security professionals say they have had an increase in number of attacks faced.<\/li>\n\n\n\n<li><strong>80%<\/strong>&nbsp;of security professionals say attack-sophistication has increased.<\/li>\n\n\n\n<li><strong>94%<\/strong>&nbsp;of organisations worldwide have suffered a data breach.<\/li>\n<\/ul>\n\n\n\n<p>It\u2019s clear that cyber attacks are on the rise as the number of easy targets and weak points increase, so how much of a threat are they in the grand scheme of risks, post-pandemic?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Greater the Risk, the Greater the&nbsp;<s>Reward<\/s>&nbsp;Risk<\/h2>\n\n\n\n<p>According to an analysis done by the&nbsp;<a href=\"https:\/\/www.visualcapitalist.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Visual Capitalist<\/a>, Remote Working Cyber Attack threat makes it into the top 9 most likely risks post-Covid-19.<\/p>\n\n\n\n<p>The article, \u201c<a href=\"https:\/\/www.visualcapitalist.com\/whats-at-risk-an-18-month-view-of-a-post-covid-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">What\u2019s At Risk: An 18-Month View of a Post-COVID World<\/a>\u201d, takes data submitted&nbsp;by a large number of risk analysts and compiled in a&nbsp;<a href=\"http:\/\/www3.weforum.org\/docs\/WEF_COVID_19_Risks_Outlook_Special_Edition_Pages.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">World Economic Forum&nbsp;report<\/a>&nbsp;and displays it visually in the infographic below:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Likelihood%20Infographic.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>The infographic highlights the 31 biggest risks and their likelihood percentage within the next 18 months.<\/p>\n\n\n\n<p>The risks are categorised into the following five areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Economic<\/strong><\/li>\n\n\n\n<li><strong>Societal<\/strong><\/li>\n\n\n\n<li><strong>Geopolitical<\/strong><\/li>\n\n\n\n<li><strong>Tech<\/strong><\/li>\n\n\n\n<li><strong>Environmental<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Of the four tech risks identified within the data set,&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;takes the number one spot with a likelihood of 37.8%.<\/p>\n\n\n\n<p>That\u2019s a significant jump ahead of the next tech threat identified:&nbsp;<em>Increased Automation-related Unemployment<\/em>, which sits at 24.8% likelihood, and is miles ahead of the next two tech threats:&nbsp;<em>Abrupt Technology Adoption<\/em>&nbsp;and&nbsp;<em>IT Breakdown<\/em>, which sit at 13.8% and 6.9%, respectively.<\/p>\n\n\n\n<p>The scary fact is, the threat of&nbsp;<strong>Remote Working Cyber Attacks&nbsp;<\/strong>is great enough that it warrants a spot in the top 10 alongside the \u2018big dogs\u2019 of risks, so to speak:&nbsp;<em>Prolonged Global Recession<\/em>,&nbsp;<em>High Unemployment<\/em>,&nbsp;<em>More Restricted Travel \/ Trade Movement<\/em>&nbsp;and<em>&nbsp;Industries Fail(ing) to Recover<\/em>, among others.<\/p>\n\n\n\n<p>Even scarier? People tend to drop this risk from the pool of \u2018big dogs\u2019 when it comes to their top concerns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Post-Covid Priorities Are All Out of Whack<\/h2>\n\n\n\n<p>The Visual Capitalist gathered further data on how big of a concern these same risk analysts believed each risk was for the world:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Concerns%20Inforgraphic.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>The findings show that all top 10 risks \u2013 bar one \u2013 have retained their places in the top 10 as concerns, albeit in a slightly different order.<\/p>\n\n\n\n<p>The single threat that was considered a top 10 risk that didn\u2019t make the cut this time around is our top tech risk:&nbsp;<strong>Remote Working Cyber Attacks<\/strong>, which now sits at 25.4% and 13th place when it comes to concern.<\/p>\n\n\n\n<p>Essentially this means that although&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;are 37.8% likely to leave an impact on the world as we know it post-Covid, they are only seen as a 25.4% concern, with a 12.4% disparity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">When Disparity Becomes a Danger<\/h2>\n\n\n\n<p>This disparity in the actual threat versus how much it is perceived to be a threat, is a big problem.<\/p>\n\n\n\n<p>It means that people working from home are unlikely to implement the proper security measures needed to protect themselves, their devices and subsequently, the data and networks they have remote access to from potential cyber attacks and data breaches.<\/p>\n\n\n\n<p>In turn, organisations moving their workforce to remote locations are unlikely to take appropriate action to prevent&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;before they happen, because this risk is not seen as a big enough concern.<\/p>\n\n\n\n<p>The fact of the matter is that you should be taking this threat seriously; ensuring that all potential holes that open up when your workforce goes remote are not only covered, but airtight.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protect with PAM<\/h2>\n\n\n\n<p>A good way to ensure all of your endpoints are protected is by deploying a&nbsp;<strong>Privileged Access Management<\/strong>&nbsp;(<strong>PAM<\/strong>) solution to each and every remote endpoint.<\/p>\n\n\n\n<p><strong>PAM<\/strong>&nbsp;refers to the strategy of gaining full control and visibility of user-access to critical parts of the IT system and what they do when they have privileged access, so that data breaches and abuse of privilege can be prevented or audited in the case of occurrence.<\/p>\n\n\n\n<p><strong>PAM<\/strong>&nbsp;solutions do this by only allowing elevated privileges precisely when and where users need them and giving users only the minimum privileges required to perform their function in the workplace.<\/p>\n\n\n\n<p>These techniques are known as&nbsp;<strong>Just-in-Time<\/strong>&nbsp;elevation (<strong>JIT<\/strong>) and the&nbsp;<strong>Principle of Least Privilege<\/strong>&nbsp;(<strong>POLP<\/strong>).<\/p>\n\n\n\n<p>Admin By Request is a<strong>&nbsp;<\/strong><strong>PAM<\/strong>&nbsp;solution that incorporates&nbsp;<a href=\"https:\/\/www.opswat.com\/developers\/metadefender-cloud-api\" target=\"_blank\" rel=\"noreferrer noopener\">OPSWAT\u2019s MetaDefender Cloud<\/a>&nbsp;to ensure that hackers:<\/p>\n\n\n\n<p>a) Can\u2019t gain administrator access to endpoints without permission, therefore cannot undertake processes required to infiltrate your network, and<\/p>\n\n\n\n<p>b) Can\u2019t get past&nbsp;<a href=\"https:\/\/www.opswat.com\/developers\/metadefender-cloud-api\" target=\"_blank\" rel=\"noreferrer noopener\">MetaDefender\u2019s<\/a>&nbsp;35+ anti-malware engines that scan all files run as administrator, and prevent files flagged as malicious from being run on your endpoints and causing potential damage to your wider organisation.<\/p>\n\n\n\n<p>Admin By Request, developed by the aptly named&nbsp;<a href=\"https:\/\/www.fasttracksoftware.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">FastTrack Software<\/a>, enables organisations to quickly and effectively manage privileged access and ensure the remote workforce is safe by:<\/p>\n\n\n\n<p><strong>1. Being easy to deploy on remote endpoints<\/strong><\/p>\n\n\n\n<p>Admin By Request makes ease of deployment a top priority. Requiring no AD configuration, the 3.5MB MSI installer takes minutes to get up and running on endpoints in the home.<\/p>\n\n\n\n<p><strong>2. Patching up any security holes opened up as a result of the move<\/strong><\/p>\n\n\n\n<p>Admin By Request ensures your network, systems and data stays safe from&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;by managing who can get higher-level access, what access they can get, and when they can get it.<\/p>\n\n\n\n<p>All remote users can be managed from within the Admin By Request user portal. Admin By Request\u2019s Settings and Sub-settings allow user groups to be created with different levels of admin privileges depending on their needs.<\/p>\n\n\n\n<p>With Admin By Request, you get full visibility of what your users are getting up to when they\u2019re operating with administrator privileges, with the user portal displaying Inventory collected for each device, an Auditlog of all elevated activity and Reports which sum up and display the important bits.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.opswat.com\/developers\/metadefender-cloud-api\" target=\"_blank\" rel=\"noreferrer noopener\">OPSWAT\u2019s MetaDefender Cloud anti-malware solution<\/a>&nbsp;is the ever-present second layer of protection, flagging down malicious files as they\u2019re encountered \u2013 which is likely to continue happening at an increasing rate, particularly in a post-pandemic world where working from home is the norm.<\/p>\n\n\n\n<p>Admin By Request also utilizes a sandbox environment to further ensure your endpoints \u2013 and company bits and pieces that these endpoints can access \u2013 stay safe.<\/p>\n\n\n\n<p><strong>3. Still giving remote workers the privileged access they need to stay productive<\/strong><\/p>\n\n\n\n<p>Remote access to company networks can be granted to home-workers without compromising security, but while maintaining productivity.<\/p>\n\n\n\n<p>Remote users simply request administrator privileges to run applications as administrator or to have a timed session with administrator access. This allows remote users to stay productive: they can gain elevated privileges when and where they need them, but at the same time it keeps your network, systems and data safe by preventing unauthorised or unsecure actions that could affect the rest of the organisation.<\/p>\n\n\n\n<p>You have the option to approve or deny user requests for elevated privileges within the online user portal Request page or by using the mobile app, with the simple push of a button. And the biggest advantage of the mobile app? Requests can be approved or denied while you\u2019re stuck at home too, in the middle of attending to the teenage tantrums and tripping over the Harry Potter Lego scattered on the living room floor.<\/p>\n\n\n\n<p>Get more details\u00a0<a href=\"\/en\/blogs\/deploying-hi-rise-security-compliance-to-the-home\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>\u00a0about how Admin By Request can help make the remote workforce safe by managing admin rights.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The statistics show that you\u2019re not as worried about&nbsp;<strong>Remote Working Cyber Attacks<\/strong>&nbsp;as you should be.<\/p>\n\n\n\n<p>A post-Covid-19 world is going to be hard enough to navigate without the extra stress of a network-wide cyber attack resulting from an inadequately secured remote workforce.<\/p>\n\n\n\n<p><strong>PAM<\/strong>&nbsp;ensures that you\u2019ll be fully-equipped to work from home and that your home-workers have access to the data and systems they need without compromising security.<\/p>\n\n\n\n<p>Take the risk seriously and protect all your working-from-home endpoints before they become a concern with Admin By Request.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.<\/p>\n","protected":false},"author":2,"featured_media":2874,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[228,129,149,91,193,230,229],"ppma_author":[10],"class_list":["post-3742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-covid-19","tag-cyberattack","tag-hacked","tag-hacker","tag-remote","tag-wfh","tag-working-from-home","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"covid-19,cyberattack,hacked,hacker,remote,wfh,working from home\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-08-19T21:51:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T08:00:22+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#blogposting\",\"name\":\"Post-Covid-19 and Remote Working Cyber Attacks \\u00bb Admin By Request\",\"headline\":\"Post-Covid-19 and Remote Working Cyber Attacks\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/16-1-1.png\",\"width\":2000,\"height\":1306,\"caption\":\"Digital artwork of white lines on a black background making various scrunches in the image.\"},\"datePublished\":\"2020-08-19T21:51:00+00:00\",\"dateModified\":\"2026-01-25T08:00:22+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#webpage\"},\"articleSection\":\"Blogs, Covid-19, Cyberattack, Hacked, Hacker, Remote, WFH, Working from Home, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#listItem\",\"name\":\"Post-Covid-19 and Remote Working Cyber Attacks\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#listItem\",\"position\":3,\"name\":\"Post-Covid-19 and Remote Working Cyber Attacks\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\",\"name\":\"Post-Covid-19 and Remote Working Cyber Attacks \\u00bb Admin By Request\",\"description\":\"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/16-1-1.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\\\/#mainImage\",\"width\":2000,\"height\":1306,\"caption\":\"Digital artwork of white lines on a black background making various scrunches in the image.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#mainImage\"},\"datePublished\":\"2020-08-19T21:51:00+00:00\",\"dateModified\":\"2026-01-25T08:00:22+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request","description":"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"covid-19,cyberattack,hacked,hacker,remote,wfh,working from home","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#blogposting","name":"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request","headline":"Post-Covid-19 and Remote Working Cyber Attacks","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/16-1-1.png","width":2000,"height":1306,"caption":"Digital artwork of white lines on a black background making various scrunches in the image."},"datePublished":"2020-08-19T21:51:00+00:00","dateModified":"2026-01-25T08:00:22+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#webpage"},"articleSection":"Blogs, Covid-19, Cyberattack, Hacked, Hacker, Remote, WFH, Working from Home, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#listItem","name":"Post-Covid-19 and Remote Working Cyber Attacks"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#listItem","position":3,"name":"Post-Covid-19 and Remote Working Cyber Attacks","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be","name":"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request","description":"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/16-1-1.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be\/#mainImage","width":2000,"height":1306,"caption":"Digital artwork of white lines on a black background making various scrunches in the image."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be#mainImage"},"datePublished":"2020-08-19T21:51:00+00:00","dateModified":"2026-01-25T08:00:22+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request","og:description":"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-08-19T21:51:00+00:00","article:modified_time":"2026-01-25T08:00:22+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Post-Covid-19 and Remote Working Cyber Attacks \u00bb Admin By Request","twitter:description":"Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3742","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:23:04","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 21:56:16","updated":"2026-01-25 08:23:04"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tPost-Covid-19 and Remote Working Cyber Attacks\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Post-Covid-19 and Remote Working Cyber Attacks","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/post-covid-19-and-remote-working-cyber-attacks-youre-not-as-worried-as-you-should-be"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3742"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3742\/revisions"}],"predecessor-version":[{"id":11291,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3742\/revisions\/11291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/2874"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3742"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}