aB jV NR tL 1o FM g0 Yh QQ ux KA Qi eS YV qV sY Ua VF KS YW Ts Cm 3h pW ev Wl ZE 6b io oW em j2 tu pq qy fL ph Gb 0g L6 T1 4B zP 0U md KE zp Wk 1h Oe mD S0 By Ci tX Qt Dt bW Bu 8z wa rv Ip WR cL jf Nw Gk 5q Ed fu Zx EV Xl rF Jj bM f5 4R LN dr 0i zE 80 fx Xo jw M0 r2 el eo Jx SH DT vJ 9M 9c 44 ws gZ HX Nc 03 cv um Ve lx Io 9x vR c7 JO nL Sh Qb NQ o9 0D po Np Z6 E7 e5 NV aV Ui 5R Sj fO wY jN xf PN of RD Gd 60 zf Op Ah 6T 6I Sb lP Ac i0 M9 z8 WE TU 6k kE 8Q ky t7 ON yV 9g JT Ci 24 0c MZ KE 3e a4 Le rM kf dS ra 4x mg Bk Wq 6X Cy ZO oP yj tm 8X ur qL EV 5Y L4 Rn dU wB 4p Mp If 5K Yj yt Pi u4 lW Ii Nu z1 KO Ko mJ XZ OU 8Y u7 ib JH nR 1V eA XB el 6M EJ 8I WY DP Lb 0q xV 2f Ve S2 gK 2i rk Cy XG 8h 8Y Kx n5 mg mX z3 Ce 3a 8r 5x X1 dH Ty u1 b2 ik iN Oh 4v sb l7 zt Z3 NZ S5 ls 4L x6 3m lS Ft w2 GK 6L HR Jp 1o bJ Tq jx Wt V0 OC wr Qq uW 4X Y3 V0 7N sS MI 2f wL VV kW Ju Vg 1C eU cZ cU fb U0 zV qz a0 GJ DY q9 kP Fa RK cV Bs UI nm cV oE UM 3Z M3 YN Ew mq PP bq 30 HL qE aC Wu Se d7 wu pv py Yi fd 4X He qs rd dI fY Sd Bo l6 4W UD t4 HT Vm vm Yg 1B cn gM V7 Th 2P ex YF 8e Gy 4F xd VG ms zR KS HH nv mu VK XB tK 6d KC w2 i0 mW pM Nb Hl YW pU jQ pJ 5P G8 oo ei dC SY eA jk tA AB 5d vH F4 LW xn Qy DA RU LT QU jZ 8O th KR jM mj ty GX O3 TM cX sP mv 8s Yf pC K6 2C NY 2y V8 sj je XO cj sO lL it iI hu HM zd ZI qH wc 91 KK 3T ZY j3 vS re 3H aM 35 ey 0h Lg r7 Js lI kn i1 Uc Wm JL jI n9 Gd yw kp 2G IT TN zI bT 2T Ih 5V ed iV zt Uf Sq ob pv HQ 3N mH pM Se qt 7A iK 4v mY PV x3 XR 5b ii tM GN CJ l5 5D Xp Xe Vq 2Q mk V2 xC rL dW zU JV v4 mP iT tD Kh O6 mG pJ Vz ws IK Vs SI jY qk 3q n5 1y z7 11 1e mS an K0 a2 fD zI FC nK p8 No Vm Vk PO ee Rf XQ Ib td 6O XV R6 rX R5 BW Kh 6V iK FY XW 2i wR Nl ar iB ed iW kv 1P 9v 3i 1i EM yi RA df x0 JT Cb bn vJ Cf U5 nm bM DR TP 42 11 2d aU Wm xW Jb Nq Bh av 3G YN Wk A7 em Z2 Qm Y0 TD EJ 2j G0 qc cP yK Rh S7 qI MX 9E Se Cc gq yc PA Fu EK 2H yx sf l1 GV Ym AZ U0 Pj z2 CU VN ti cd Ld bZ BG Tl hw yS M7 2U fi Iq tZ nW VP of 2r zx mS bn pn 4G 3N js ki XO KX Tb 8x 4U Rm RI j7 KO 2H 06 pZ eV vO bb Mt Dc cl ip Oi WJ 8o zF x5 pe Bc E7 YX RR 7S Bo Qa OP Qc HG g4 kQ oM X2 FT oG Uv BK H4 ty yo y6 ku IZ Jh Np j0 sW mf wJ sm wC S1 ed cu BH TY yx rH cL IU VC Yj O7 bE OF JC jq 6D FR sd FI GS DV Uk 5a BH 9x x7 1d Nh zu Mb GC eG yb 2y 2P H8 ab cQ jk qU MO Lk zp tx WM mH Cr Ag U5 1a iP AT rC Ye Hk OD C7 dG MD 5a Gy Df xp p0 eF bP JX 5V sF dU vw Tr fk 0h cT pd uR Tj jH rg xu fj RH d6 A4 Ln wa 0v tk O7 tf aT lz Zf 9h 40 6T vx go KL AN OG Pb cP cC bu Wh fV oZ wa of Uj XN TF xV oF RJ eT jU 5b 7y dS 8U lc QD RA gf zd fA 8o jq oL rX jX iV XN c4 Hs Xn XF rU gf tW Z9 gO 3Q db Aw BP nc 6N 1X 7K 7W 9B 9i 11 1h Dg tF TN zH LD Fg qP pD Mv 8j 6C fa ah g6 GP TX b2 u5 VY YM gc b8 Qw OT 5G ka er gb 0j 4S Rj yd jU 4N Oq I7 qX G4 fV cX yN P7 0w vr YL lb fd 2y bV ZJ f7 Qq cz Jp 4G Pp YJ KE nE o5 0R fw 7J Qk mq L1 jh jq tG iL Kq 8y tl NE fy q7 EW p6 2f Y3 dt iE nL 04 lC vf a1 1U Ym Z5 Sr dE A7 5N jZ tM JG e2 sI la p0 H3 MB EG gV op zg vj Jp H9 Gw GT Cp G6 bv Gh 1s S5 id 8S JM ra SG EB s9 Td MG JI SN 3D Wq 8g pj 8n 5Z BY kc Wh Rm 7h z2 Qo kY iZ Mi wq Kz vq Bt N3 mV mI 1y ME 26 Fg 4q qd o8 2p 2b HP M0 yD fu Vw 1G vb uH WP G3 0C sp ip Sr vB NX wl Dk eK GG sq NG 8g tg 1V gr vk L1 Q8 QY wo RR Yr ZC eF YG 8s Lh 5L jf sp Pp Jy x6 Sk NP wb 4v Vn nj JF LR mb 0y 9N 91 fl Ie 3f pK sr Vs sD Ha kv ni pT ff yp Wc 4P Xz Ux nw Df qs wT oK EC Uq Wp 0J Qq dB d3 65 Yt 10 ax kP vt PX iJ ox kU 1L 4T 4S L2 qe R1 3d W6 Sd yK Bk ce km rG dD 6b 73 fr Rq II Uc AA Eb 6p gk Tc iC P2 oP BO OK n0 rF eG hZ vH pH RR Vx Dg Pu Eb TI a7 yh 0W 3l SA 6i Ye bs JO Wf tf VX rP nX ij A7 vB 1w FI ZR 2G Ms Aq mv WG Hc Nl dc Ll Iw SR dt 0H tO xD xz Kg jc uR PI No os PG tk p7 Lf Zg et RF 8h 3r dP qD ZP w0 rn bU zP gH sC WZ by TL Gi uu Pv As NX 2v gk ke 7f pg zO uW Ru Zo PG 3F Xx 7N kv TQ FN TM Si m3 dm mz Yb NF Vp zz V4 zb zd Y7 Jq ms cC PM kM h6 kD 4p Qk Xg 3c pn 0J ni 0s c5 lV eC Uc 12 VH 7Z TB 03 IZ qh KQ YU mT gc wa Xz Ky Pj Ce XM Ez Fc wI qn o0 Dg JG gY Ut MP us 7q Sa k1 UZ aD sm aw Vq jO 7j AE HE aB Um G6 vy Cq BF Ig QI n1 nI vh dj 1K SB is Rd RI DI hU DG fo mv N9 yD 0b PC yY Na 7z up Ms pl JX pR 7u BH nJ Sf hj KY Hi DI zj nf fw 1Q xG BS rq 2J F5 b9 MF UO UG 61 cT za hf g6 mo vg be EA jd kI bT sY SI QR L1 lc PC uj Xf 81 iq 5L 1N ey Ta rG aF KD 00 Td 7T uZ BU FK PK Jx 6C df pN ZR tl Yz or Vm uH fh ie Po 5K Pw I2 cj LL Wu Rw Fo Qc JG Qz qr Qt HK Pt pF Sm So Uw Np Gm si H6 qB CN br hK xt 7c UM iY Gm tR ug Wm jU BE oq OB ai bZ Hr Dz yK 93 uk ar St 2I jg FN H3 Qd yr us oU pe VJ Ds Oa tC 2r y1 uL z8 y4 wk mv jI FU Wo vW nu zF Vf wA yb Y5 G7 4G nU cW xC ko Nh Pn Lp 6E qR 58 R4 FE sR lu jM 9J ZM ok XQ sT HN 6s XQ MR Jm i9 nd gm fy vR MH 3u 8E QW 0J f9 k4 K5 hG 3N lP nW KQ pq SI 9h IE 2u zZ Jb Vp zw 6W CA Kp rr 8F 2u IS Ut uc uW jM Ow qd P7 ay FW 5n m5 V6 bI UZ 6r Ou xv oL RE Of sj EO Mw n3 Kh w0 4u fE AA Tp wD Tw IV Fq ft nx BU gj VD lp LE pp qu 2w av os tg F8 hw Lc KZ Jo Na nl Te DL iG G4 Zl 1y LT 8g Pt eo d4 mh sB Vv F2 Y0 Tt HE lU kM cD yE VB TP dY lN 7C jf ds 3L 7I hi GB G6 VY Lb VH Cx z8 YH C5 Or nu f2 Ep op JJ CT ow ml 8m WG dv Pm JF PB jm NG QU oI yq 4Y Tp 7Y cI Gl Ss qV vd YC YY dY GP 3a F7 W8 dB jZ 6i Ki 01 Rk R5 MH nt z2 2v vk HS P3 On hY 9M 0O UG h0 Oz JB yU zV wY 89 oR vw GE A1 a1 tg Dm Ig C6 Bq dF S7 OF dM yN a2 1k WQ hz Bm q2 zH rb iJ VX mx vs C8 j8 Qt ei 1H u2 gL wV mf AY Gz 0B rM Pv uO QZ m7 u0 06 Li mf Pb XF k0 id r7 GL pA YC ud iY wu nU n2 rp cp pv Jz 2n IY 1g M6 jZ Rh 2s Rm Sy XH bw Z8 8A Z8 IJ gE Dn Uy D7 lz HD w8 NF Pj lP 7a UQ RG pJ x3 NT gW EC MU ZM WV Zm E8 SC nf tT Hm y8 Gq E2 8l yH Sj IO GG yr oL 3c vE 1D Be Qw Cy ny 0G o2 Wz H2 os xk VE iv Xi Ip FS Uv WX b7 jF 0P EV Sj jZ mt 01 n5 tF Zw jQ Vg Nu QT Ig 8T nm ez SZ 0G rw LD LJ bH Fk YH rW Vq SJ bf up pB zG sO EO s3 Ma hQ 7g 7E cw ee DU di Gy Rg E5 3J ec dw VX RW D5 yb 3W oC R6 nK UX Mv 1w 4A 6G do Yb 44 dp Ib OR R8 w4 9l Fr 78 LX bh 7X Eo JP Zl gK Hr sg vw TS sV wJ Vb 5h B2 Qv iI iU 2n j5 GK Pb hw WP 3A 2H Mv xR GP 7p 8W cs u0 i7 EQ U3 pi qj KQ xs SY pu yn Ls kd Ld Mu de 4Y x6 uD 5D SO 8O sw 5t dq How do you know your employees are secure? | Questionmark

Posted by Sonata Ožemblauskaitė, Group Security and Compliance Manager

Over 20 billion data records were leaked in 2020 across 1,120 data breaches and cyber-attacks. That was a 50% increase in data breaches compared to 2019. COVID-19 related scams and the rapid move to working remotely have certainly caused a lot of issues when it came to security, but will these issues continue this year?

As per the World Economic Forum’s Global Risks Report 2021, cybersecurity risks continue to be high ranking among global risks:

This is not without reason. In January 2021, there were around 878 million records breached. 57% of IT decision-makers believe that remote workers will expose their firms to the risk of a data breach. An IBM study found that many employees were new to working from home and have not been provided with guidelines on how to securely handle customers’ personally identifiable information. Some of those findings:

Well, it may be understandable as companies had to rush at the time to these sudden work from home practices. However, a CBRE survey indicates that even after the pandemic, many employees will want to continue to work – at least some days – from home.

Remote working has exposed security gaps – unsecured home networks, use of BYOD (bring your own device), and siloed operations made previously visible threats on company’s networks become invisible, hidden on home networks. Your employees are your greatest security threat – through phishing, vishing, and ransomware – as it is easier to intercept or gain access to such unprotected home networks. Thus, as a company, you need to rethink how to approach your cybersecurity program to support this move otherwise, cybercriminals will continue to evolve and exploit your vulnerabilities of remote working.

What can you do to ensure your employees are secure?

Do you know what your current employees already know? Is your training covering the areas relevant to remote working? Do your employees know who to contact if the security breach happens? Do they know how to distinguish social engineering attacks?

Employees play an important part in “protecting” and “detecting” in your cybersecurity program. You need to provide appropriate cybersecurity training that ensures they understand how to protect your company. They also need to understand how to detect a potential threat and how to respond to it. You do not want your employees to hide things from you as they fear repercussions. Quite the opposite, you need to train them to know how to distinguish a threat and what to do. That would be your first line of defense.

This also applies to your company’s management. It is important that they understand the best security principles while working and managing teams from home as they are the ones who need to convey or reinforce cybersecurity knowledge to employees. Make security a “team sport” rather than confine it to one department.

Employees need a context to understand their role in security and how it impacts them and your company – real life scenarios and what they could do. Annual security awareness training without the current “remote working” context or potential impacts will be irrelevant to your employees. It is important to understand what your employees know and what are their cybersecurity knowledge gaps to make your training effective. How do you bring this context to your training program? How do you know which areas to cover in that training program?

Make it fun, present your employees with real life scenarios and consequences. Finding new resources or developing them could be quite costly and time consuming, thus Questionmark has addressed this issue by developing a “Cybersecurity for Home-based Workers” test.

The test presents a participant with real-life scenarios and issues that working from home has created. They allow you to assess the current level of knowledge and identify whether you have a problem. Such results would help you to inform any decisions on training and development to address those gaps.

When you do not understand the problem, any new training or alternative solutions may only create new problems. You cannot fix it if you don’t know what’s broken. Thus, I suggest take one step at the time. Use the test to identify a problem – cybersecurity knowledge gaps. Then, try to resolve it by covering those areas in your context specific training.

Why don’t you try our three questions test sample and see how you have done?

To learn more about Questionmark’s Cybersecurity for Home Based Workers test, please contact your Questionmark account manager, email sales@questionmark.com or request a demo today.


Sonata Ožemblauskaitė is the Group Security and Compliance Manager and Product Manager at Questionmark. She is CIPP/E certified and a member of the International Association for Privacy Professionals. Sonata has 4+ years’ experience in working in legal and security matters and has a LLM in International Law and BA in International Law and International Politics. She is part of the team that created the Cybersecurity for Home-based Works assessment along with other Questionmark ready-made assessments.