What are the computer threats facing teleworkers

Telework today has become a professional habit.

Despite this, he continues to raise the eminent issue of computer security. It is a question of why hackers target remote workers so much. The question is very simple. Indeed, they are prime targets simply because in terms of security, they are less equipped than companies. This makes it easier for cyber criminals.

Today the problem is no longer new. Indeed, for the past few months, an observation of the computer attacks clearly shows that they have increased. In terms of persistence but also in November. And that coincided simply with the explosion of remote work that has imposed itself on companies because of population containment, itself a direct consequence of the coronavirus pandemic.

"Telework has not only disrupted the way work structures our days, it has also forced us to change production tools. The first containment forced many individuals to turn to their personal computers in order to continue working, in conditions sometimes far from equal to those of the workplace, especially with regard to computer security. explains Christophe Corne, CEO of Systancia, a French company that publishes cybersecurity software. This coincides with the lack of equipment available to the individual when working from home. Hackers know that. Personal data is exposed under these conditions.

"During the first confinement, we went from two to five million teleworkers, so three million more teleworkers in 24 hours" notes Christophe Corne,

Asked what might explain why teleworkers are so targeted by hackers, the CEO of Systancia replies: "We had to use personal computers, and this is often the beginning of the problems. Indeed, these computers are rarely checked by the employer, nor equipped with a firewall as effective as those used by companies. And yet, cybersecurity is the responsibility of the employer. It is up to them to equip the employee with the necessary technology because an individual does not have the capacity to manage his computer security as a company would."

In general, telework, hackers were literally attracted or even called. Because the surfaces of attacks have multiplied, with the intervention of individual computers on professional fields. "As digital technology becomes more and more important in our professional, personal, or citizen lives, our data is gaining value," says Hugues Foulon, Orange's Director of Cyber security Strategy and Activities.

"There are three families of attackers," says Foulon: "First there are the hackers, who are looking for performance, and to be recognized for overcoming a technical difficulty. Then the mafias, or the scoundrels, even criminal companies when they attack hospitals, which will seek to steal gains: steal money, embezzle funds, a signature or a purchase order." "And finally, the third category, which is talked about a little less, is the states or agencies dependent on a state, which will aim to destabilize an enemy country, to weaken some of its activities. ».

Generally, individuals are exposed to the second type of cybercriminals. Hackers who aim to get rich.

The most common attacks that have been identified are first and foremost phishing called phishing, phishing. "If you see a lot of it, it's because it works. The aim is to trick the victim into believing that he is talking to a trusted third party in order to obtain sensitive information from him. Thinking they're getting an email from their bank, people click on an attachment that will infect their post, looking for bank data. "signifies Hugues Foulon.

The second most common attack in this sector and the famous ransomware. The ransom software is used by hackers to extort money from organizations as they manage to trap the computer system. Today, ransom software users are no longer limited to organizations. They also go after the particular at worst.

"Malware encrypts data, and hackers make it look like it can't be recovered unless they pay a ransom," notes Foulon.

Now access an unlimited number of passwords:

Check out our hacking software