<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Business Analysis Archives | Business Beam</title>
	<atom:link href="https://businessbeam.com/blog/business-analysis/feed/" rel="self" type="application/rss+xml" />
	<link>https://businessbeam.com/blog/business-analysis/</link>
	<description>Digital Transformation Consulting Firm</description>
	<lastBuildDate>Thu, 07 Aug 2025 14:28:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://businessbeam.com/wp-content/uploads/2018/11/favicon.png</url>
	<title>Business Analysis Archives | Business Beam</title>
	<link>https://businessbeam.com/blog/business-analysis/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Manage Information Security &#038; Continuity Risks while Working Remotely</title>
		<link>https://businessbeam.com/manage-information-security-continuity-risks-while-working-remotely/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=manage-information-security-continuity-risks-while-working-remotely</link>
		
		<dc:creator><![CDATA[Ikram Khan]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 12:06:35 +0000</pubDate>
				<category><![CDATA[Agile & DevOps]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business & ICT Continuity]]></category>
		<category><![CDATA[Business Analysis]]></category>
		<guid isPermaLink="false">https://businessbeam.com/?p=9744</guid>

					<description><![CDATA[<p>With a significant number of employees worldwide forced to work from home, organizations are beginning to face the threats associated with remote work without proper oversight or preparation. Here’s a quick overview of some of these risks. </p>
<p>The post <a href="https://businessbeam.com/manage-information-security-continuity-risks-while-working-remotely/">How to Manage Information Security &#038; Continuity Risks while Working Remotely</a> appeared first on <a href="https://businessbeam.com">Business Beam</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;"><img fetchpriority="high" decoding="async" class="wp-image-9746 alignright" src="https://businessbeam.com/wp-content/uploads/2020/06/How-to-manage-risk-while-working-remotely-300x174.jpg" alt="" width="500" height="291" srcset="https://businessbeam.com/wp-content/uploads/2020/06/How-to-manage-risk-while-working-remotely-300x174.jpg 300w, https://businessbeam.com/wp-content/uploads/2020/06/How-to-manage-risk-while-working-remotely-768x446.jpg 768w, https://businessbeam.com/wp-content/uploads/2020/06/How-to-manage-risk-while-working-remotely-1024x595.jpg 1024w, https://businessbeam.com/wp-content/uploads/2020/06/How-to-manage-risk-while-working-remotely-1110x645.jpg 1110w, https://businessbeam.com/wp-content/uploads/2020/06/How-to-manage-risk-while-working-remotely.jpg 1200w" sizes="(max-width: 500px) 100vw, 500px" />Before the COVID-19 pandemic, organizations’ main business continuity risk was the “non-availability of working facilities or offices”. </span></p>
<p><span style="font-weight: 400;">In fact, upon being asked “Due to any reason (e.g. fire, flood, earthquake, civil unrest, etc.), if you and your teams are unable to come to your office, how in your opinion the IT would continue the support for company’s operations?”, managers of IT departments replied with “IT teams would work from home”. </span></p>
<p><span style="font-weight: 400;">Now, however, working from home has become the norm, and may continue to be so in the upcoming months. According to a </span><span style="font-weight: 400;">survey conducted in March 2020 by Gartner</span><span style="font-weight: 400;">, <a href="https://www.gartner.com/en/newsroom/press-releases/2020-04-03-gartner-cfo-surey-reveals-74-percent-of-organizations-to-shift-some-employees-to-remote-work-permanently2">74% of CFO believe</a> some of their employees who were forced to work from home may decide to continue working remotely even when the pandemic comes to an end.</span></p>
<p><span style="font-weight: 400;">Some respondents believe companies themselves will request employees to continue at home to manage costs until they recover financially from the aftermath of the pandemic. On-premises technology spends and real estate expenses are the top two costs organizations have deferred or plan to do so in the near future. </span></p>
<h2><span style="font-weight: 400;">The Risks Companies Face While Employees Work from Home</span></h2>
<p><span style="font-weight: 400;">With a significant number of employees worldwide forced to work from home, organizations are beginning to face the threats associated with remote work without proper oversight or preparation. Here’s a quick overview of some of these risks. </span></p>
<h3><span style="font-weight: 400;">1. Business Continuity Risks </span></h3>
<p><span style="font-weight: 400;">By definition, continuity risks are high impact and low probability risks. <img decoding="async" class="size-medium wp-image-9749 alignright" src="https://businessbeam.com/wp-content/uploads/2020/06/Asset-3-1-300x245.png" alt="Risk assessment matrix" width="300" height="245" srcset="https://businessbeam.com/wp-content/uploads/2020/06/Asset-3-1-300x245.png 300w, https://businessbeam.com/wp-content/uploads/2020/06/Asset-3-1-768x627.png 768w, https://businessbeam.com/wp-content/uploads/2020/06/Asset-3-1-1024x836.png 1024w, https://businessbeam.com/wp-content/uploads/2020/06/Asset-3-1-512x418.png 512w, https://businessbeam.com/wp-content/uploads/2020/06/Asset-3-1.png 1025w" sizes="(max-width: 300px) 100vw, 300px" /></span></p>
<p><span style="font-weight: 400;">In this diagram, the impact of risks is shown on the X-axis (low to high) whereas the probability of risks is on Y-axis </span><span style="font-weight: 400;">(low to high). Upon dividing the diagram into four quadrants, continuity related risks belong to 4</span><span style="font-weight: 400;">th</span><span style="font-weight: 400;"> quadrant (Q4), where the impact is high and probability is low. </span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Traditionally while developing Continuity Plans, consultants including our own ensure that the organization has developed the required level of resilience by offering all the processes, tools, accesses, facilities, training to staff members, etc. for such a situation.</span></p>
<p><span style="font-weight: 400;">As work from home has become the norm for several IT teams the ‘non-availability of office facilities’ will not remain as </span><b>Continuity Risk</b><span style="font-weight: 400;">. Instead, it will be considered an </span><b>operational risk</b><span style="font-weight: 400;">. Keeping the above diagram in mind, ‘work from home’ will have a higher probability and therefore move to Q1. </span></p>
<p><b>Meanwhile, risks mentioned in Q1 and Q2 will come under the operational (business as usual) risks category.</b></p>
<p><span style="font-weight: 400;">In this case, the IT Continuity Risk Assessment will have a very different set of risks in the risk register post-COVID-19 lockdowns. Assuming that few teams always work from home, possible risks include:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Nonavailability of internet facilities</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Interruption in a cellular network</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Overcrowding of collaboration tools like Zoom, WebEx, and Microsoft Teams</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Non-availability of the critical team member(s) </span></li>
</ul>
<h3><span style="font-weight: 400;">Access, Authorization, and Authentication Threats</span></h3>
<p><span style="font-weight: 400;">Organizations that have not established or maintained a robust remote structure are struggling the most during the pandemic. Remote connectivity has left them vulnerable to access, authorization, and authentication risks. </span></p>
<p><span style="font-weight: 400;">Companies may not have comprehensive policies for access control &#8211; i.e. methods to guarantee users are who they say they are before providing them appropriate access to data. Similarly, they may not be able to carry out authentication (verify someone is who they claim to be) or authorization (determine if a user should be allowed access to data or make a transaction). </span></p>
<p><span style="font-weight: 400;">Without these measures being part of a company’s remote work policy, sensitive data will be exposed. This is especially true if employees access this data through a public-facing web server that operates with a software vulnerability. </span></p>
<p><span style="font-weight: 400;">Access mining is another issue companies may face. The collection and selling of access descriptors such as IP addresses and usernames and passwords is currently a thriving business that benefits cybercriminals. With their credentials leaked, organizations may end up facing catastrophic results. </span></p>
<h3><span style="font-weight: 400;">2. Unsanctioned Remote Access to IT Infrastructure </span></h3>
<p><span style="font-weight: 400;">Employees working remotes are working on a network that is not directly controlled by their organizations. Without a Virtual Private Network (VPN), businesses cannot maintain network security and end up facing an increased risk of data breaches and leaks of sensitive information. </span></p>
<p><span style="font-weight: 400;">As most businesses did not get the time to prepare for the mass move from offices to home spaces, companies are under pressure to monitor network security risks and block access to internal infrastructure upon detecting any suspicious access attempts. This, in turn, can affect employee productivity as most attempts would be their own. </span></p>
<h3><span style="font-weight: 400;">3. Use of Bring Your Own Devices</span></h3>
<p><span style="font-weight: 400;">With employees using their own mobile devices to share data or access information, they put companies at the risk of data theft. This is especially true when they neglect to change mobile passwords or do not have a BYOD policy at their workplace. </span></p>
<p><span style="font-weight: 400;">Companies face risk exposure from employees’ devices on the corporate network if they have malware or other Trojan software. With no mobile device management policy in place, companies have no authority to wipe these devices if they are lost, stolen, or used in violation of company policies. </span></p>
<h2><span style="font-weight: 400;">Top Measures for Improving Security and Reducing Risks </span></h2>
<p><span style="font-weight: 400;">While the aforementioned barely scratch the surface, their impacts can cripple a business indefinitely. Therefore, enterprises need to take several steps including those listed below. </span></p>
<h3><span style="font-weight: 400;">1. Invest in VPNs</span></h3>
<p><span style="font-weight: 400;">The Novel Coronavirus has made VPNs transform from being a luxury into a necessity for all working social classes. Using a virtual private network enables the creation of an encrypted virtual tunnel for traffic between employees’ home and work networks. As a result, the risk of attackers intercepting this data is reduced. Moreover, they make online behavior safer. </span></p>
<p><span style="font-weight: 400;">While VPN is ideal for transporting data securely, keep in mind that it provides limited anonymity. Furthermore, employees are not fully protected against targeted advertising. Therefore, you need to consult with an expert before implementing VPNs in a secure way. </span></p>
<h3><span style="font-weight: 400;">2. Focus on Reducing Human Error</span></h3>
<p><span style="font-weight: 400;">While employees are vital for your success, they may also be the cause of your downfall. The following are common human errors that can compromise the security and continuity of your business. </span></p>
<ul>
<li style="font-weight: 400;"><b>Misdelivery – </b><span style="font-weight: 400;">The fifth most common cause of cybersecurity breaches, misdelivery entails sending confidential information to the wrong people. A classic example of this is when an NHS practice employee ended up sending an email notification to HIV patients but accidentally entered email addresses in the ‘to’ field rather than the ‘bcc’ field. </span></li>
<li style="font-weight: 400;"><b>Password Issues – </b><span style="font-weight: 400;">Most users tend to make password mistakes such as reusing the same password of their main email account, writing down passwords, or sharing them around. The majority also use simple passwords. In fact, 123456 is the most popular password worldwide. </span></li>
<li style="font-weight: 400;"><b>Delay in Patch Installation –</b><span style="font-weight: 400;"> Users can delay installing security updates on their computers. As a result, this provides cybercriminals the opportunity to attack. </span></li>
</ul>
<p><span style="font-weight: 400;">Organizations need to take important measures such as enforcing privilege control, password control, and two-factor authentication across the business. They also need to create a security-focused culture where security is an integral part of every decision and action. Training will further help with this aspect as long as it is engaging and relevant. </span></p>
<h3><span style="font-weight: 400;">3. Develop Strict Access Control Protocols </span></h3>
<p><span style="font-weight: 400;">Access controls are integral as they add a layer of security around the network. Therefore, you need to implement these and ensure they do not log or else holes will appear in your perimeter. </span></p>
<p><span style="font-weight: 400;">The use of role-based access control (RBAC) has been known to help enterprises. Monitoring and strategically restricting access controls can also help reduce the risk of human error to your cybersecurity. </span></p>
<h2><span style="font-weight: 400;">Let Us Help You Get the Most from Working from Home </span></h2>
<p><span style="font-weight: 400;">There is so much more that organizations need to do to address any security gaps which can compromise their business. Business Beam’s team of consultants can help you in this regard by:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Delivering real value instead of documenting for the sake of document</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Offering solid experience developed after conducting over 100 risk assessment exercises, mostly as part of implementing any other framework</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Providing the expertise of senior-level, certified and experienced consultants to help you achieve your security goals</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Utilizing ISO 31000 as the base framework for<a href="https://businessbeam.com/consulting/information-cyber-security-gap-assessment-planning/"> IT risk assessment</a>; in addition to having certified consultants, Business Beam is authorized by PECB to conduct official <a href="https://businessbeam.com/risk-audit-iso-31000-crisc-cisa/">ISO 31000 training courses</a> with the certification examination</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Offering <a href="https://businessbeam.com/blog/cobit-2019/">COBIT 2019 authorized assessments</a> and training courses with certification examinations</span></li>
</ul>
<p><em><strong>So do not hesitate to <a href="https://businessbeam.com/business-enquiry-form/">contact us</a> with your security needs to be fully prepared for the upcoming change in work cultures. </strong></em></p>
<p>The post <a href="https://businessbeam.com/manage-information-security-continuity-risks-while-working-remotely/">How to Manage Information Security &#038; Continuity Risks while Working Remotely</a> appeared first on <a href="https://businessbeam.com">Business Beam</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
