Intelligent CIO Middle East Issue 55 | Page 80

////////////////////////////////////////////////////////// What is the impact of remote working and BYOD on endpoint security? When accessing corporate networks remotely, there is a higher risk of unauthorised access and data leakage. Employees may engage in behaviour they would never consider at the office, such as sharing a device with other family members or using the same device for both personal and work activities. Also, the use of Home ISPs and public Wi-Fi attack surface that is o security team’s contro The biggest financial cybercrime occur thro Compromise (BEC/EA take over or spoof the manager or executive to instruct another me email to make a wire account, usually on th phony invoice. www.intelligentcio.com