Preface
์ฝ๋ก๋์ ์ธ๊ณ์ ์ธ ์ ํ์ผ๋ก ์ฌํ๊ทผ๋ฌด์์ ์ซ์๊ฐ ํญ๋ฐ์ ์ผ๋ก ๋๊ณ ์๋ ์ถ์ธ์ด๋ค. ์
๋ฌด ์์ฐ์ฑ๋ ๊ทธ๋๋ก ์ ์งํ๊ณ , ์๋กญ๊ฒ ๋ฐ์ํ๋ ๋ณด์ ์ด์๋ ํด๊ฒฐํด์ผ ํ๊ธฐ ๋๋ฌธ์ ๊ธฐ์
๋ณด์ํ ๋๋ ๋ณด์ ๋ฐด๋์ ์ด๊นจ๊ฐ ๋ฌด๊ฑฐ์ด ํ์ค์ด๋ค. ์๋ฌธ ๊ธฐ์ฌ๋ฅผ ์ฝ๋ค ๋ณด๋ ์ฌํ๊ทผ๋ฌด์ ๋ณด์์ด์์ ์๊ด ๊ด๊ณ๋ฅผ ๋ค๋ฃจ๋ ๊ธฐ์ฌ๋ค์ ์๋์ ๊ฐ์ ํจํด์ด ์์๋ค.
โ ์ฝ๋ก๋๋ก ์ธํด ๋ง์ ๊ธฐ์
๋ค์ด ์ฌํ๊ทผ๋ฌด๋ก ๋์์ฐ๋ค.
โก ๊ธฐ์
๋ค์ ์์ฐ์ฑ๊ณผ ๋ณด์ ์ ์ง๋ก ๋ง์ ๊ณ ๋ฏผ์ ์๊ณ ์๋ค.
โข ๋๋ถ๋ถ ์ฌํ๊ทผ๋ฌด์๋ค์ด ๋ณด์์ ์์ค์ ๋จ์ด๋จ๋ฆฌ๋ ๋์ ์ต๊ด๋ค์ ๊ฐ์ง๊ณ ์๊ณ , ์ด๋ก ์ธํด ๋ณด์ ์ด์๊ฐ ๋๋๋๊ณ ์๋ค.
โก ํด๊ฒฐ ๋ฐฉ๋ฒ์ - ํ ๊ฒ๋ค์ด ์๋ค.
์ด๋ฐ ํจํด์ผ๋ก ๋์ค๋ ํํ๋ค์ ์ต์ํด์ง๋ค๋ฉด ์ฝ๋ก๋๋ก ์ธํ ์ฌํ๊ทผ๋ฌด๋ฅผ ์ฃผ์ ๋ก ์ด์ผ๊ธฐํ ๋, ์ด๋ฉ์ผ์ ์ธ ๋์๋ ํธ๋ฆฌํ ๊ฒ ๊ฐ์ ์ ๋ฆฌํด๋ณธ๋ค.
Main Takeaway
โ ์ฌํ๊ทผ๋ฌด
- Work remotely/ Work from home/ Home working
โ ์ฌํ๊ทผ๋ฌด๊ฐ ๋๊ณ ์๋ค.
- The sudden switch to a fully remote workforce
- Increasing numbers of people work remotely.
- Working from home has risen at an exponential rate as a result of the COVID-19 pandemic.
โ ์ฌํ๊ทผ๋ฌด ๊ธฐ๊ฐ์ ๋๋ฆฌ๊ณ ์๋ค.
- More organizations extend remote work for the longer-term.
โ ์ฌํ๊ทผ๋ฌด์ ๊ด๋ จ๋ ์ํ์ ์ธ์ง ํ์ง ๋ชปํ๋ค.
- Many are not aware of the risks involved in connecting remotely.
โ ์ฌํ ๊ทผ๋ฌด์๋ค์ ๋์ ๋ณด์ ์ต๊ด์ด ํ์ฌ๋ฅผ ์ํํ๊ฒ ํ๋ค.
- Pose security risks for businesses
- Put businesses at a higher risk of cyber-attacks.
- This is posing additional security risks for businesses.
- These risks are being increased further by bad cybersecurity behaviors.
- Remote work inevitably brings a new set of risks and challenges
โ ์ํ ์ํ
- Be sure to notify your company’s IT administrator so they can immediately mitigate risk(์ํ ์ํ)
โ ๋ณด์ ์ต๊ด/๊ด์ต
- Good practice/ poor cyber security practice
- Poor personal cybersecurity practices are commonplace amongst workers
โ ๋ณด์ ์์น ์์
- Ensuring all work and communication is conducted only on approved devices, applications and collaboration tools.
- Businesses must constantly review their security policies
โ ์๋ชป๋ ๋ณด์ ์์น
- Share device with others in their household
- A large proportion of remote workers regularly engage in practices including using unmanaged, insecure BYOD(bring your own devices) devices to access corporate systems
- Some staff are making cybersecurity mistakes in their homes
- Unsecurely save passwords in browsers
- Allow other members of their household to use their corporate devices for activities like schoolwork
โ ์ ๋ฐ์ดํธ๋ฅผ ํ๋ค
- Keep video conferencing software up-to-date
- Not ensure software on devices are updated
- Constantly updating
- Verify that the operating systems and application software they use are up-to-date.
- Cybersecurity policy as well as awareness and behavior change programs will all require updates based on today’s working conditions.”
โ '์ฌํ๊ทผ๋ฌด&๋ณด์ ์ด์' ๊ด๋ จ ์์๋๋ฉด ๋์์ด ๋ ๋ฌธ์ฅ๋ค
- The lines between personal and professional are increasingly blurred [์ผ๊ณผ ์ฌ์ํ ๊ฒฝ๊ณ์ ์ด ํ๋ฆฟํด์ง๋ค].
- Businesses will need to adjust their cybersecurity approaches accordingly [ํ์ฌ๋ ์ ์ํ (adjust to)/ ์กฐ์ (adjust)ํ ํ์๊ฐ ์๋ค].
- What may have worked in the past doesn’t necessarily work now[๊ณผ๊ฑฐ์ ํจ๊ณผ๊ฐ ์์์ง๋ง, ์ง๊ธ์ ์๋ ์๋ ์๋ค].
- Responsibility for security needs to be split between employees and employers[์ฑ ์์ ์ง์๋ค๊ณผ ๊ณ ์ฉ์ฃผ ๋ชจ๋์ ์๋ค/ ์ฑ ์์ ๊ณต์ ํ๋ค].
- Decreasing exposure is critical in the context of an expanded attack surface[์ค๋ํฌ์ธํธ ๊ณต๊ฒฉ ๋ ธ์ถ ๋น๋๋ฅผ ์ค์ด๋ ๊ฒ์ด ์ค์]
- Some businesses have a good enough cyber and network security system in place[์ ๋๋ก ๋ ๋คํธ์ํฌ ๋ณด์ ์์คํ ์ ์ด์ ์ค์ด๋ค]
- Organizations of all kinds are facing an uptick in email-based threats, endpoint-security gaps and other problems[์ด๋ฉ์ผ์ ํตํ ๊ณต๊ฒฉ์ด ์ฆ๊ฐํ๋ค]
- Phishing attacks are widely recognized as the top cause of data breaches[ํผ์ฑ๊ณต๊ฒฉ์ ๋ฐ์ดํฐ ์นจํด ๊ณต๊ฒฉ์ ์ฃผ์์์ธ]
- Hackers can easily send seemingly legitimate, deceptive emails with malicious links and attachments[๊ธฐ๋ง, ์์ด๋ ๋ฉ์ผ]
- Simple passwords are incredibly easy for hackers to crack[ ์ํธ๋ฅผ ํ๋ค]
- It allows hackers to gain unauthorized access to multiple accounts in a very short period of time.[๋น์ธ๊ฐ ์ ๊ทผ]
Source
-https://www.forbes.com/sites/carrierubinstein/2020/04/10/beware-remote-work-involves-these-3-cyber-security-risks/#5ce44a9861c4
-www.infosecurity-magazine.com/news/poor-cybersecurity-behaviors-uk/
-https://www.infosecurity-magazine.com/opinions/remote-work-challenges/
๋๊ธ