HomeTips & HacksCOVID-19, security and remote working – common myths and misconceptions

COVID-19, security and remote working – common myths and misconceptions

If you purchase via links on our reader-supported site, we may receive affiliate commissions.
cyberghost vpn ad

With COVID-19 stay-at-home orders still in place in many states, remote working has become the beginning of what will be the ‘new normal’ in the post-pandemic world. Given this, remote security should be at the top of every organizations’ priority list.

Yet there remains a long list of common myths and misconceptions about remote worker security. And it’s easy to see how and why this can happen – especially in a world where staff went from working on site to working from home practically overnight, but it is critical that businesses make themselves aware of what these myths and misconceptions are, and address them with the urgency they require.

The list is long, so below are the five most pressing.

Zoom meetings are end-to-end encrypted

Zoom Meetings For Remote Working

Video chat has exploded into people’s lives over the last couple of months. What was until very recently used mainly as a meeting tool (with a video function that people often tried to avoid) has suddenly become an essential part of our everyday lives – both for work and recreation.

And the video app of choice has turned out to be Zoom. But many people are still operating under the misconception that Zoom chats are end-to-end encrypted when they are not. In fact, a number of privacy issues have come to light, such as Zoom’s iOS app sending data to Facebook without explicit user consent. While this issue has since been rectified, people are still operating under the encryption misconception when it comes to Zoom and other videoconferencing apps, some of which are end-to-end encrypted and some of which are not.

VPN solutions will work seamlessly

Another common misconception that remote workers are operating under is that VPN connections will work and that there will be sufficient bandwidth and licenses for VPN solutions. This may not be the case because VPN has always been somewhat of an afterthought.

Until Covid-19 took over our everyday lives, VPN was generally used in special scenarios where someone needed to work remotely or outside their usual working hours. Because of this, housekeeping, maintenance, management, and administration of VPN are not very effective. Organizations don't have dedicated people to handle those things. Most VPNs require a lot of bandwidth and adequate licenses. With millions of us working from home amid the pandemic, everybody is trying to use VPN, which means issues with bandwidth and licensing that we just hadn’t thought of.

VPN solutions are secure for remote working

VPN Solutions For Remote Working


VPN solutions also lend themselves to a common remote-working security myth – that VPN solutions are fully secure. They aren’t. Generally speaking, we don’t see day-to-day housekeeping of VPN servers, such as patching. Compounding this, organizations are often not on the latest versions of their VPN.

This can mean a remote, unauthenticated user may be able to compromise a vulnerable VPN server and gain access to all active users and their plain-text credentials. Also, such an attacker may be able to execute arbitrary commands on each VPN client as it successfully connects to the VPN server.

Given this, and now that VPN has suddenly become so popular – and is likely to stay that way in the post-pandemic world – we need to make sure that VPN solutions are up to date and patched, so that hackers don’t see VPN as an easy vehicle through which to conduct an attack.

Personal device security is equal to company device security

In some ways it seems so obvious that personal device security is often a far cry from company device security, yet so many organizations allow personal devices to be used for company business without a second thought for security.

It’s obviously a challenge even during normal times for remote working security to be implemented on any personal device that might be used for company business, but during these extraordinary times where companies had to set staff up to work from home literally overnight in many cases, it’s an understandable oversight.

Still, it’s an oversight that can have catastrophic consequences if not addressed. Firms must implement two-factor authentication, content filtering, identity and access management, encryption, auto backups, authentication, and security monitoring to any personal device being used for company business.

These are some of the things that you'd see in a typical corporate network, but we don’t see on personal devices; it’s a long and dangerous list of disparities creating a myth of security that isn’t there.

Read Also: Coronavirus: Online Security Tips For Remote Working

Remote workers always know how to spot a suspect email

Suspect Email

They don’t, and this is particularly problematic in the current situation, given the massive rise in phishing and spam emails since the Covid-19 situation took hold.

And with the majority of organizations currently with remote working staffs, this problem is only magnified. The pandemic is giving rise to a huge amount of fear, uncertainty, anxiety, sympathy, greed, and disorder, meaning clarity is easily taken advantage of.

This makes phishing emails even more effective, because our defenses are down and we are sitting alone at home with no one to bounce ideas off, ask immediate questions of, or get opinions from. We are vulnerable right now, and hackers know it.

It’s exceptionally important that companies stay on top of these latest and advanced emerging phishing attacks and stop operating under the myth that their remote teams are going to be able to spot a suspect email every time. They probably won’t.

About the author: Vikram Chabra is director of the cyber security practice at NetEnrich.


John Raymond
John Raymond
John Raymond is a cybersecurity content writer, with over 5 years of experience in the technology industry. He is passionate about staying up-to-date with the latest trends and developments in the field of cybersecurity, and is an avid researcher and writer. He has written numerous articles on topics of cybersecurity, privacy, and digital security, and is committed to providing valuable and helpful information to the public.


Delete Me
Incogni Black Friday Ad
Heimdal Security ad


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.