Nearly half of UK businesses admit current cyber security policies are not fit for home-working
New research from Centrify reveals insight into businesses’ preparation, policies and approaches to 100 per cent remote working during the Coronavirus outbreak
June 25, 2020
LONDON ― June 25, 2020 ― Almost half (48 per cent) of business decision makers have admitted that their existing cyber security policies are currently not suitable for maintaining a 100 per cent remote working model. This increased risk has led to nearly two thirds (65 per cent) anticipating an increase in phishing and breach attempts, according to a new survey from, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions.
The survey, conducted by independent polling provider Censuswide on behalf of Centrify, polled 200 senior decision makers in large-and medium-sized businesses on how they are adapting to the impact of the Coronavirus outbreak.
In response to their own concern, three-quarters (75 per cent) of those surveyed revealed that they have issued formal guidance or training to staff about how to operate securely whilst working from home. Similarly, 50 per cent are planning to hire in new IT staff or security experts to improve security processes.
Furthermore, 59 per cent of business decision makers said that outsourced IT and other third parties are being treated as an equal cyber security concern as 100% remote working employees. This closes an important potential security gap, especially given that IT personnel often have privileged administrative access to infrastructure and other critical resources.
“Acknowledging the security issues posed by remote working is essential during this difficult time. Unfortunately, remote workers including third-party contractors have been deemed a desirable target by hackers and cyber criminals, who are assuming that these employees have not been properly trained in, or protected by, the correct security measures in their transition to remote working during the Covid-19 pandemic,” said Andy Heather, VP at Centrify.
"However, it’s promising to see that so many businesses have adjusted security policies in response to this threat and are still considering bolstering security and IT staff," Heather continued. "Fortunately, overhauling cyber security policy and procedure does not have to be overly strenuous or expensive – instead, it requires a cohesive effort from all colleagues and employees, strong password hygiene including the use of Multi-Factor Authentication, and an Identity-Centric privileged access management solution to protect company data from breaches.”
For more information about Centrify, please visit.
Centrify is redefining the legacy approach to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
®Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.