{"id":5894,"date":"2020-08-07T12:06:41","date_gmt":"2020-08-07T11:06:41","guid":{"rendered":"https:\/\/cybersmart.com\/?p=5894"},"modified":"2021-09-24T09:29:39","modified_gmt":"2021-09-24T09:29:39","slug":"how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/","title":{"rendered":"How to shift to working from home permanently without compromising your cybersecurity"},"content":{"rendered":"

Coronavirus has the potential to change the world of work forever.<\/span><\/i><\/p><\/blockquote>\n

Unless you\u2019ve spent the last few months consciously avoiding the media, chances are you\u2019ve read that sentence a lot. From morning talk shows to breathless newspaper op-eds, it feels like everyone is talking about the society-wide shift to working from home. <\/span>
\n<\/span>
\n<\/span>But what started as a necessary evil that many businesses adopted reluctantly has turned into something else. First came <\/span>announcements from Twitter and Facebook<\/span><\/a> that employees would be allowed to \u2018work from home forever\u2019 if they chose. This was followed by a host of other businesses including Google, Amazon, JPMorgan, Captial One, Slack, Salesforce, Microsoft and PayPal extending their work-from-home options. <\/span>
\n<\/span><\/b><\/p>\n

Why is this happening? <\/b><\/h3>\n

Well, it\u2019s actually very simple. An increasing number of businesses are seeing the real benefits of a more permanent shift to remote working.<\/span><\/p>\n

Why rent office space for 300 people when you could use a smaller venue for essential meetings at half the cost? Why insist staff make long commutes into the office, when they\u2019re happier and more productive working from home?\u00a0<\/span><\/p>\n

For many organisations, the COVID-19 pandemic has turned these questions from water cooler conversations into key pillars of business strategy.\u00a0<\/span><\/p>\n

If your business is considering making the switch to permanent remote working, are you prepared for the risks you should be aware of? And, how can you overcome them and ensure your people are working safely?\u00a0<\/span><\/p>\n

What risks does working from home present?\u00a0<\/b><\/h3>\n

While switching to remote working offers benefits in productivity and real estate savings, it also comes with some risks. Here are a few of the most common.\u00a0<\/span><\/p>\n

Unsecured personal devices<\/b>\u00a0<\/span><\/h4>\n

The first question to ask is: can you be sure your people will follow the same security protocols they would in the office? The networks and security tools your staff use at home are likely to be far less secure than those in the office. Home office networks are 3.5 times more likely than corporate networks to be infected by malware, according to a report from BitSight.\u00a0<\/span><\/p>\n

There may even be a psychological element to this. As ZDNet has <\/span>reported<\/span><\/a>, 52% of employees believe they can get away with riskier behaviour when working from home. For example, sharing\u00a0<\/span>confidential files via email instead of the usual, safer channels.\u00a0<\/span><\/p>\n

Lack of remote-working policies and procedures<\/b><\/h4>\n

Part of the reason employees are exposing themselves to risk at home is simply a lack of knowledge of these risks. The COVID-19 pandemic developed so quickly that many businesses didn\u2019t have time to put in place clear policies and procedures for working from home so employees were literally left to their own devices.<\/span>
\n<\/span>
\n<\/span>This makes cybersecurity a bit of a guessing game, particularly for the less security-literate of your staff.\u00a0<\/span><\/p>\n

Heightened risk of attack<\/b><\/h4>\n

Cybercriminals are smart but they\u2019re largely opportunistic. And it hasn\u2019t taken them long to figure out that switching to remote working has made businesses vulnerable. <\/span>
\n<\/span><\/p>\n

VMWare\u2019s recent <\/span>Global Threat Report,<\/span><\/i><\/a> reveals that 91% of global respondents have seen an increase in cyber attacks as a result of employees working from home. Meanwhile, the proportion of attacks targeting remote workers increased from <\/span>12% of all email traffic in March to 60% just six weeks later.\u00a0<\/a><\/span><\/p>\n

91% of organisations have seen an increase in cyber attacks as a result of employees working from home.<\/span><\/p><\/blockquote>\n

Keen to exploit our hunger for coronavirus updates, cybercriminals have set up thousands of COVID-19-related \u2018news\u2019 sites. These double up as hosts for malware and domain names to launch phishing attacks from. Without the robust controls deployed by most corporate networks, it\u2019s incredibly easy for people working from home to fall into the trap.\u00a0<\/span><\/p>\n

The other area cybercriminals are targeting more regularly is VPNs. VPNs have long been a weak point for cybersecurity. They were only ever intended for small numbers of workers to use occasionally, not whole companies all the time. As a result, many VPNs are insecure and provide cybercriminals with a much wider \u2018attack surface\u2019 with which to launch threats<\/span>.\u00a0<\/span><\/p>\n

Reliance on the Cloud<\/b><\/h4>\n

We talked about some of the potential issues with cloud storage in a recent <\/span>blog<\/span><\/a> and, while it\u2019s the safest option for businesses, it\u2019s not invulnerable to attack.\u00a0<\/span><\/p>\n

Working from home naturally increases your reliance on the Cloud. And this isn\u2019t necessarily a bad thing. However, cybercriminals are becoming better all the time at breaking through providers\u2019 defences and intercepting data as it moves between employees\u2019 devices and the cloud.\u00a0<\/span><\/p>\n

How can you overcome these risks?\u00a0<\/b><\/h3>\n

We\u2019ve tackled some of the risks involved in switching to working from home, so what can you do about it?<\/span><\/p>\n

Provide clear policies and encourage communication<\/b><\/h4>\n

This is the most important step on this list. If your people don\u2019t know which behaviours are harmful, they can\u2019t correct them. Ensure all security policies for workers are clear and easy to follow. If you don\u2019t have a remote working security policy, now\u2019s the time to draft one. <\/span>
\n<\/span>
\n<\/span>Alongside this, work to foster a culture of communication. That way, employees will feel comfortable asking for help with anything they don\u2019t understand and reporting anything suspicious to internal security teams. All too often,
security mistakes<\/a> are made because staff feel \u2018silly\u2019 raising their concerns.\u00a0<\/span><\/p>\n

Ensure the right security is in place<\/b>\u00a0<\/span><\/h4>\n

Many of the most common threats can be prevented simply by ensuring your people have the tools they need. Check that all corporate-owned or managed devices are equipped with the best security capabilities. Also, make sure that the security best practices you\u2019d use in the office are extended to the home environment.\u00a0<\/span><\/p>\n

Maintain good password hygiene<\/b><\/h4>\n

Set up a password policy and ensure everyone follows it. Employees should always use complex passwords and two-factor authentication, as well as change passwords regularly.\u00a0<\/span><\/p>\n

Make sure software is up to date<\/b><\/h4>\n

Your employees should regularly install updates and patches for the software on their devices, no matter how much they might enjoy not restarting their laptop for months on end.\u00a0<\/span><\/p>\n

Keep it professional<\/b><\/h4>\n

Encourage your workers to keep work devices for work and personal devices for everything else. Limiting the number of sites employees visit can limit the risk of attack.\u00a0<\/span><\/p>\n

Secure Wi-Fi access points<\/b><\/h4>\n

Network gateways are an underappreciated aspect of good cyber hygiene. Most of us don\u2019t think much about our WiFi once it\u2019s up and running. However, changing the default settings and passwords on a router can reduce the potential of attack from connected devices. <\/span>
\n<\/span><\/p>\n

Understand the risks<\/b><\/h4>\n

Hopefully, this article has been some help in identifying some of the risks remote working presents. But it can\u2019t be stressed enough that understanding the risks is key to preventing them. IT teams need to identify the most likely areas of attack and prioritise the protection of areas of your business that cybercriminals could do the most damage to.\u00a0<\/span><\/p>\n

Although the switch to working from home comes with difficulties, it\u2019s also a golden opportunity to remould the way your business functions. Alongside, the obvious real estate savings, remote working promises happier employees, more productive work and greener business practices. Don\u2019t let poor cybersecurity stand in the way of your business embracing the future.\u00a0<\/span><\/p>\n

Looking to improve your cybersecurity but not sure where to begin? Start by getting certified in <\/span><\/i>Cyber Essentials<\/span><\/i>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/span><\/i><\/p>\n

\"CTA<\/p>\n","protected":false},"excerpt":{"rendered":"

Coronavirus has the potential to change the world of work forever. Unless you\u2019ve spent the last few months consciously avoiding the media, chances are you\u2019ve read that sentence a lot….<\/p>\n","protected":false},"author":8,"featured_media":6299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[169,124,9,83,35,168,126,171,172],"yoast_head":"\nHow to work from home permanently without compromising cybersecurity<\/title>\n<meta name=\"description\" content=\"Is your business considering making the shift to working from home permanent? Here's what you need to know about the risks and how to overcome them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to work from home permanently without compromising cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Is your business considering making the shift to working from home permanent? Here's what you need to know about the risks and how to overcome them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-07T11:06:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-24T09:29:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1647\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob S\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob S\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\"},\"author\":{\"name\":\"Rob S\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\"},\"headline\":\"How to shift to working from home permanently without compromising your cybersecurity\",\"datePublished\":\"2020-08-07T11:06:41+00:00\",\"dateModified\":\"2021-09-24T09:29:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\"},\"wordCount\":1244,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg\",\"keywords\":[\"Cloud security\",\"COVID-19\",\"Cyber Essentials\",\"cybersecurity\",\"IT Security\",\"password security\",\"remote working\",\"security policy\",\"Working from home\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\",\"name\":\"How to work from home permanently without compromising cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg\",\"datePublished\":\"2020-08-07T11:06:41+00:00\",\"dateModified\":\"2021-09-24T09:29:39+00:00\",\"description\":\"Is your business considering making the shift to working from home permanent? Here's what you need to know about the risks and how to overcome them.\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg\",\"width\":2560,\"height\":1647},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to shift to working from home permanently without compromising your cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\",\"name\":\"Rob S\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"caption\":\"Rob S\"},\"url\":\"https:\/\/cybersmart.com\/author\/rob-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to work from home permanently without compromising cybersecurity","description":"Is your business considering making the shift to working from home permanent? Here's what you need to know about the risks and how to overcome them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How to work from home permanently without compromising cybersecurity","og_description":"Is your business considering making the shift to working from home permanent? Here's what you need to know about the risks and how to overcome them.","og_url":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2020-08-07T11:06:41+00:00","article_modified_time":"2021-09-24T09:29:39+00:00","og_image":[{"width":2560,"height":1647,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Rob S","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Rob S","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/"},"author":{"name":"Rob S","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff"},"headline":"How to shift to working from home permanently without compromising your cybersecurity","datePublished":"2020-08-07T11:06:41+00:00","dateModified":"2021-09-24T09:29:39+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/"},"wordCount":1244,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg","keywords":["Cloud security","COVID-19","Cyber Essentials","cybersecurity","IT Security","password security","remote working","security policy","Working from home"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/","url":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/","name":"How to work from home permanently without compromising cybersecurity","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg","datePublished":"2020-08-07T11:06:41+00:00","dateModified":"2021-09-24T09:29:39+00:00","description":"Is your business considering making the shift to working from home permanent? Here's what you need to know about the risks and how to overcome them.","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/mikey-harris-hRlna96fZOI-unsplash-scaled.jpg","width":2560,"height":1647},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/how-to-shift-to-working-from-home-permanently-without-compromising-your-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"How to shift to working from home permanently without compromising your cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff","name":"Rob S","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","caption":"Rob S"},"url":"https:\/\/cybersmart.com\/author\/rob-s\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/5894"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=5894"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/5894\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6299"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=5894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=5894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=5894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}