๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ
๐Ÿ‘จ‍๐Ÿš€์˜์–ดํƒ๊ตฌ

[์‚ฌ์ด๋ฒ„๋ณด์•ˆ] ์˜๋ฌธ๊ธฐ์‚ฌ _ ์žฌํƒ๊ทผ๋ฌด์™€ ๋ณด์•ˆ์ด์Šˆ ์˜์–ด ํ‘œํ˜„ ์ •๋ฆฌ

by ์œถ์จ” 2020. 8. 29.

Preface 

์ฝ”๋กœ๋‚˜์˜ ์„ธ๊ณ„์ ์ธ ์œ ํ–‰์œผ๋กœ ์žฌํƒ๊ทผ๋ฌด์ž์˜ ์ˆซ์ž๊ฐ€ ํญ๋ฐœ์ ์œผ๋กœ ๋Š˜๊ณ  ์žˆ๋Š” ์ถ”์„ธ์ด๋‹ค. ์—…๋ฌด ์ƒ์‚ฐ์„ฑ๋„ ๊ทธ๋Œ€๋กœ ์œ ์ง€ํ•˜๊ณ , ์ƒˆ๋กญ๊ฒŒ ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์ด์Šˆ๋„ ํ•ด๊ฒฐํ•ด์•ผ ํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๊ธฐ์—… ๋ณด์•ˆํŒ€ ๋˜๋Š” ๋ณด์•ˆ ๋ฐด๋”์˜ ์–ด๊นจ๊ฐ€ ๋ฌด๊ฑฐ์šด ํ˜„์‹ค์ด๋‹ค. ์˜๋ฌธ ๊ธฐ์‚ฌ๋ฅผ ์ฝ๋‹ค ๋ณด๋‹ˆ ์žฌํƒ๊ทผ๋ฌด์™€ ๋ณด์•ˆ์ด์Šˆ์˜ ์ƒ๊ด€ ๊ด€๊ณ„๋ฅผ ๋‹ค๋ฃจ๋Š” ๊ธฐ์‚ฌ๋“ค์— ์•„๋ž˜์™€ ๊ฐ™์€ ํŒจํ„ด์ด ์žˆ์—ˆ๋‹ค.

โ‘  ์ฝ”๋กœ๋‚˜๋กœ ์ธํ•ด ๋งŽ์€ ๊ธฐ์—…๋“ค์ด ์žฌํƒ๊ทผ๋ฌด๋กœ ๋Œ์•„์„ฐ๋‹ค.  
โ‘ก ๊ธฐ์—…๋“ค์€ ์ƒ์‚ฐ์„ฑ๊ณผ ๋ณด์•ˆ ์œ ์ง€๋กœ ๋งŽ์€ ๊ณ ๋ฏผ์„ ์•ˆ๊ณ  ์žˆ๋‹ค.  
โ‘ข ๋Œ€๋ถ€๋ถ„ ์žฌํƒ๊ทผ๋ฌด์ž๋“ค์ด ๋ณด์•ˆ์˜ ์ˆ˜์ค€์„ ๋–จ์–ด๋œจ๋ฆฌ๋Š” ๋‚˜์œ ์Šต๊ด€๋“ค์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ , ์ด๋กœ ์ธํ•ด ๋ณด์•ˆ ์ด์Šˆ๊ฐ€ ๋Œ€๋‘๋˜๊ณ  ์žˆ๋‹ค.
โ‘ก ํ•ด๊ฒฐ ๋ฐฉ๋ฒ•์€ - ํ•œ ๊ฒƒ๋“ค์ด ์žˆ๋‹ค. 


์ด๋Ÿฐ ํŒจํ„ด์œผ๋กœ ๋‚˜์˜ค๋Š” ํ‘œํ˜„๋“ค์— ์ต์ˆ™ํ•ด์ง„๋‹ค๋ฉด ์ฝ”๋กœ๋‚˜๋กœ ์ธํ•œ ์žฌํƒ๊ทผ๋ฌด๋ฅผ ์ฃผ์ œ๋กœ ์ด์•ผ๊ธฐํ•  ๋•Œ, ์ด๋ฉ”์ผ์„ ์“ธ ๋•Œ์—๋„ ํŽธ๋ฆฌํ•  ๊ฒƒ ๊ฐ™์•„ ์ •๋ฆฌํ•ด๋ณธ๋‹ค.  

Image Credits : Unsplash

 

Main Takeaway
โ–  ์žฌํƒ๊ทผ๋ฌด

- Work remotely/ Work from home/ Home working 

 

โ–  ์žฌํƒ๊ทผ๋ฌด๊ฐ€ ๋Š˜๊ณ  ์žˆ๋‹ค.

-  The sudden switch to a fully remote workforce

-  Increasing numbers of people work remotely.

-  Working from home has risen at an exponential rate as a result of the COVID-19 pandemic.

 

โ–  ์žฌํƒ๊ทผ๋ฌด ๊ธฐ๊ฐ„์„ ๋Š˜๋ฆฌ๊ณ  ์žˆ๋‹ค.

-  More organizations extend remote work for the longer-term.

 

โ–  ์žฌํƒ๊ทผ๋ฌด์™€ ๊ด€๋ จ๋œ ์œ„ํ—˜์„ ์ธ์ง€ ํ•˜์ง€ ๋ชปํ•œ๋‹ค.

-  Many are not aware of the risks involved in connecting remotely.

 

โ–  ์žฌํƒ ๊ทผ๋ฌด์ž๋“ค์˜ ๋‚˜์œ ๋ณด์•ˆ ์Šต๊ด€์ด ํšŒ์‚ฌ๋ฅผ ์œ„ํ—˜ํ•˜๊ฒŒ ํ•œ๋‹ค. 

-  Pose security risks for businesses

-  Put businesses at a higher risk of cyber-attacks. 

This is posing additional security risks for businesses. 

-  These risks are being increased further by bad cybersecurity behaviors.

-  Remote work inevitably brings a new set of risks and challenges  

 

โ– ์œ„ํ—˜ ์™„ํ™” 

-  Be sure to notify your company’s IT administrator so they can immediately mitigate risk(์œ„ํ—˜ ์™„ํ™”)

 

โ– ๋ณด์•ˆ ์Šต๊ด€/๊ด€์Šต

- Good practice/ poor cyber security practice 
- Poor personal cybersecurity practices are commonplace amongst workers 

โ– ๋ณด์•ˆ ์ˆ˜์น™ ์˜ˆ์‹œ 

- Ensuring all work and communication is conducted only on approved devices, applications and collaboration tools.

- Businesses must constantly review their security policies 


โ– ์ž˜๋ชป๋œ
๋ณด์•ˆ ์ˆ˜์น™ 

- Share device with others in their household

- A large proportion of remote workers regularly engage in practices including using unmanaged, insecure BYOD(bring your own devices) devices to access corporate systems

- Some staff are making cybersecurity mistakes in their homes

- Unsecurely save passwords in browsers

- Allow other members of their household to use their corporate devices for activities like schoolwork

 

โ–  ์—…๋ฐ์ดํŠธ๋ฅผ ํ•˜๋‹ค

- Keep video conferencing software up-to-date

- Not ensure software on devices are updated
- Constantly updating
- Verify that the operating systems and application software they use are up-to-date.
- Cybersecurity policy as well as awareness and behavior change programs will all require updates based on today’s working conditions.”

 

โ– '์žฌํƒ๊ทผ๋ฌด&๋ณด์•ˆ ์ด์Šˆ' ๊ด€๋ จ ์•Œ์•„๋‘๋ฉด ๋„์›€์ด ๋  ๋ฌธ์žฅ๋“ค 

- The lines between personal and professional are increasingly blurred [์ผ๊ณผ ์‚ฌ์ƒํ™œ ๊ฒฝ๊ณ„์„ ์ด ํ๋ฆฟํ•ด์ง€๋‹ค].

- Businesses will need to adjust their cybersecurity approaches accordingly [ํšŒ์‚ฌ๋Š” ์ ์‘ํ• (adjust to)/ ์กฐ์ •(adjust)ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค].

What may have worked in the past doesn’t necessarily work now[๊ณผ๊ฑฐ์— ํšจ๊ณผ๊ฐ€ ์žˆ์—ˆ์ง€๋งŒ, ์ง€๊ธˆ์€ ์•„๋‹ ์ˆ˜๋„ ์žˆ๋‹ค]. 

- Responsibility for security needs to be split between employees and employers[์ฑ…์ž„์€ ์ง์›๋“ค๊ณผ ๊ณ ์šฉ์ฃผ ๋ชจ๋‘์— ์žˆ๋‹ค/ ์ฑ…์ž„์„ ๊ณต์œ ํ•˜๋‹ค]. 

- Decreasing exposure is critical in the context of an expanded attack surface[์•ค๋“œํฌ์ธํŠธ ๊ณต๊ฒฉ ๋…ธ์ถœ ๋นˆ๋„๋ฅผ ์ค„์ด๋Š” ๊ฒƒ์ด ์ค‘์š”]

- Some businesses have a good enough cyber and network security system in place[์ œ๋Œ€๋กœ ๋œ ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ์‹œ์Šคํ…œ์„ ์šด์˜ ์ค‘์ด๋‹ค]

- Organizations of all kinds are facing an uptick in email-based threats, endpoint-security gaps and other problems[์ด๋ฉ”์ผ์„ ํ†ตํ•œ ๊ณต๊ฒฉ์ด ์ฆ๊ฐ€ํ•˜๋‹ค]

- Phishing attacks are widely recognized as the top cause of data breaches[ํ”ผ์‹ฑ๊ณต๊ฒฉ์€ ๋ฐ์ดํ„ฐ ์นจํ•ด ๊ณต๊ฒฉ์˜ ์ฃผ์š”์›์ธ] 

- Hackers can easily send seemingly legitimate, deceptive emails with malicious links and attachments[๊ธฐ๋งŒ, ์†์ด๋Š” ๋ฉ”์ผ]

- Simple passwords are incredibly easy for hackers to crack[ ์•”ํ˜ธ๋ฅผ ํ’€๋‹ค]

- It allows hackers to gain unauthorized access to multiple accounts in a very short period of time.[๋น„์ธ๊ฐ€ ์ ‘๊ทผ]

 

Source
-https://www.forbes.com/sites/carrierubinstein/2020/04/10/beware-remote-work-involves-these-3-cyber-security-risks/#5ce44a9861c4
-www.infosecurity-magazine.com/news/poor-cybersecurity-behaviors-uk/
-https://www.infosecurity-magazine.com/opinions/remote-work-challenges/

๋Œ“๊ธ€