22 free cybersecurity tools you should know about What is cybersecurity mesh and how can it help you?
X
Tip

10 remote work cybersecurity risks and how to prevent them

Larger attack surfaces, limited oversight of data use, AI-driven attacks and vulnerable enterprise technologies are among the security risks faced in remote work environments.

While return-to-office mandates are becoming more common, flexible work environments remain firmly established in the workplace. Over half of U.S. employees (52%) work in hybrid environments, while 27% work fully remotely, according to Gallup's latest research on hybrid work. The poll also reveals a high turnover risk for companies that eliminate flexible work arrangements, with 64% of remote workers and 29% of hybrid workers indicating they would likely leave their jobs if their current remote or hybrid options were taken away.

But flexible working environments create cybersecurity challenges for IT teams, who must contend with securing remote access points and connections to company data amid escalating cyberattacks supercharged by AI. Nearly three-quarters (74%) of IT decision-makers said that AI-powered attacks significantly threaten their organization's security, according to the "2025 Armis Cyberwarfare Report."

How does remote work affect cybersecurity?

Cybersecurity teams have been beefing up their organization's defenses and adjusting security strategies based on lessons learned after remote work was widely scaled up during the pandemic's early days, said Colin Troha, managing director at Boston Consulting Group's BCG Platinion unit and the firm's North American leader on cybersecurity.

"The new defenses and strategies are designed to counter the security challenges that arose from the expansion of remote work, Troha said. However, many of those challenges remain in play -- and new ones have emerged with the adoption of AI by both attackers and defenders. As a result, many teams "still struggle with getting the right protections and the right security mechanisms in place -- not only for now, but for the future, too," he said.

Efforts are further complicated by the chronic understaffing of cybersecurity teams and job-related burnout. Sixty-five percent of cybersecurity professionals indicated that their job had gotten harder in the last two years, with 27% reporting that their job had gotten much more difficult, according to a late 2024 survey by the Information Systems Security Association (ISSA) and analyst firm Enterprise Strategy Group, now part of Omdia.

Diagram listing remote security risk factors
Cybersecurity teams need to be prepared for these security issues with employees who work remotely.

Common remote working cybersecurity risks

Working remotely, or mixing that and in-office work, can raise the risk of data breaches and different types of cyberattacks for various reasons, according to Troha and other security experts. Here are 10 of the most prominent cybersecurity risks associated with remote work and the work-from-anywhere movement.

1. Expanded attack surfaces

With more employees working remotely, the attack surface in organizations has become larger. They have more endpoint devices, networking connections and software to secure, all of which greatly increase the workload for security staffs that are often stretched thin, said Kumar Avijit, vice president at research firm Everest Group. "That also adds to the complexity of what [teams] must secure," he added.

2. Limited or no oversight of how remote workers handle data

In recent years, many security teams have implemented tools that prevent workers from downloading sensitive information to their local devices, yet data loss due to remote work is still a real problem, Troha said. In fact, he and other consultants said work-from-anywhere environments increase the risk of data breaches and leaks even in organizations with strong data protection policies and procedures. With security teams having less direct oversight of employees outside the office, remote work heightens the chances of both unintentional and malicious exposure or loss of corporate data. For example, workers might have sensitive data on their screens that could be seen by other people -- whether family members and visitors at home or strangers passing by at a public location. Also, disgruntled employees leaving for another job can easily snap photos of proprietary data on their screens when working remotely -- something they likely wouldn't do in an office, where they might be noticed.

3. Challenges in complying with data regulations

Organizations might find that regulatory compliance is more challenging in work-from-anywhere environments. Remote workers can access and transport data in ways that violate the growing list of data privacy and protection laws, as well as contractual obligations with other organizations, said Scott Reynolds, senior director for enterprise cybersecurity at professional association ISACA. "You may have contracts that say this data may only be processed in the EU or the U.K.," he said. "But, if you have workers coming to the U.S. or working remotely elsewhere and they start working on that data, that introduces a compliance risk."

4. Increased susceptibility to phishing and other social engineering attacks

Phishing and other types of social engineering attacks are a threat whether workers are in the office or remote. However, such attacks tend to be more successful when aimed at remote workers, said independent consultant Sushila Nair, former head of security services at Capgemini's North American practice.

"Research has found that people working from home can be more distracted and they're more likely to click on suspicious links," said Nair. Additionally, remote workers can't verify the authenticity of emails. Moreover, remote workers can't verify that email messages purportedly sent by colleagues are legitimate as easily as if they were working in the same office with others. That increases the chance they fall victim to phishing emails disguised as requests for passwords or data from co-workers and executives, as well as customers, business partners and other reputable organizations.

5. Increased vulnerability to AI-driven attacks

Attackers are using generative AI tools to automate social engineering attacks, said Ed Skoudis, president of the SANS Technology Institute, a college that's part of cybersecurity training, education and certification firm SANS Institute. Remote workers -- especially ones who don't regularly meet in person with others -- might have an even harder time distinguishing such attacks from legitimate communications. For example, without strong working relationships between them and co-workers, they might not detect the increasingly subtle differences in language used by attackers impersonating colleagues with the help of AI tools. In addition, generative AI enables attackers to create and carry out phishing campaigns much faster than they could on their own, increasing the number of attacks that both remote and in-office workers can face.

6. Unsecured and vulnerable hardware

The combination of increased remote work and longstanding BYOD policies means many people use personal devices to do their jobs, regardless of whether they have the skills to adequately secure and protect their laptops and smartphones, said Jim Wilhelm, principal in the cybersecurity practice at KPMG. Organizations can require employees to take certain steps, such as changing default passwords, but security leaders don't always have visibility into whether workers fully comply with such mandates. "CISOs have to hope their workers are following their security policies," said Steven McKinnon, associate director of cybersecurity vulnerability assessments at consulting firm Guidehouse's Defense and Security Segment.

7. Unsecured and vulnerable networks

Remote work also increases the chance that employees use unsecured networks, such as public Wi-Fi. Even home networks are often vulnerable to attacks. "Corporations can secure their own networks, but they can't know how any network that's not corporately managed -- whether it's a network in a worker's house or at their local cafe -- is configured," Reynolds said. "They're essentially relying on a third party to implement the needed network security."

8. Networks shared with other vulnerable devices

The fact that other users tend to be on public Wi-Fi and home networks further expands cybersecurity risks, Troha said. If someone else's device is poorly secured, an attacker could use it as a conduit into the network and then, ultimately, into a remote worker's device, too.

9. Webcam hacking and Zoombombing

Early in the pandemic, attackers exploited the increased use of video conferencing and online collaboration platforms without strong security controls. Cybercriminals sabotaged remote meetings and online conferences and prowled around undetected on Zoom and other platforms to obtain information to use to their advantage. Skoudis said the risk of such incidents still exists, although it has been mitigated by the defensive measures that security teams rushed into place in response to those incidents.

10. Vulnerabilities in chat platforms

More commonly now than trying to infiltrate meetings, attackers are targeting chat platforms used by employees. "They're getting into an organization's chat, where they'll watch and monitor for months to see how people are interacting," Skoudis said. "Then, they'll build relationships, build trust and gather information." Remote workers who only or mostly engage with colleagues through the chat function tend to be less likely to detect an attacker's subterfuge, he added.

Cybersecurity best practices in remote work environments

The following security management best practices can drastically reduce an organization's chances of suffering a costly -- and sometimes devastating -- cyberattack that takes advantage of weaknesses and vulnerabilities in remote work environments:

  • Implement basic security controls. "Make sure you have your security fundamentals nailed down," McKinnon said. "For example, have an inventory of assets. Communicate your policies to your employees, and make sure they understand those policies because the security risks [related to remote work] are even more prevalent now." Other expert-recommended basic steps include using VPNs to access enterprise systems; ensuring devices that access the enterprise network have antivirus software; following a strong password policy that requires unique passwords for different sites; and using encryption to protect sensitive data and cloud-based file sharing to keep data off worker devices.
  • Strengthen the corporate data security and protection program. "Know where your digital information is, what information you're collecting, where your crown jewels are stored and what you're doing to protect the data," Reynolds said. He and others said security leaders also must develop comprehensive data security awareness training for employees, so they are better equipped to safeguard data wherever they're working. That's a key part of building a broader cybersecurity culture in an organization.
  • Establish a strong vulnerability management program. Effective vulnerability management also bolsters remote working cybersecurity processes. Use a risk-based approach to quickly address vulnerabilities that present the highest risks and reduce the overall number of unpatched vulnerabilities that attackers could exploit. Doing so can also aid in attack surface management initiatives aimed at better protecting IT assets that attackers are likely to target.
  • Implement a zero-trust framework. All remote users and devices should be required to verify that they're authorized to access the enterprise network and then individual systems, applications and data sets. A zero-trust security approach denies access to IT systems by default and gives authenticated users access to only the ones they need to do their jobs.
  • Deploy user behavior analytics tools. UBA -- or user and entity behavior analytics (UEBA), as it's increasingly known -- is a key component of the zero-trust framework. The technology uses machine learning and data science to identify and understand a user's typical pattern of accessing enterprise systems, and it flags suspicious activities that could indicate user credentials have been compromised.
  • Ensure proper cloud configurations and access. Misconfigurations are a leading cause of security incidents in public cloud infrastructure. Security teams should work with the IT operations staff to take measures to eliminate glitches, gaps or errors that could expose a remote work environment to risks during cloud migration and operation. They should also institute sensible user access controls in cloud-based systems.
  • Update policies and procedures to address the heightened security risks associated with remote work. CISOs and their teams, along with IT and data privacy professionals, must ensure they're updating their organization's security policies, procedures and protections to address the new and evolving threats that affect remote and hybrid workplaces. For example, Skoudis said IT administrators need to be more diligent about managing access to corporate chat functions by taking steps such as disabling worker access when employees leave the company, implementing MFA for chat and giving workers a mechanism to report suspicious chat activity. Those tasks often weren't a high priority before remote work became a standard option, he added.
  • Enable relationships and in-person connections. Skoudis said organizations should create opportunities for remote and hybrid workers to build relationships with their bosses and teammates, as well as meet in person -- especially when onboarding new employees. Such connections might enable remote users to better recognize social engineering attacks and bolster their overall attentiveness to help keep the organization secure.

Editor's note: This tip on the risks associated with remote work and mitigating best practices was updated in June 2025 to reflect the current cybersecurity environment.

Mary K. Pratt is an award-winning freelance journalist with a focus on covering enterprise IT and cybersecurity management.

Next Steps

Cybersecurity budget breakdown and best practices

Benefits of outsourcing your cybersecurity operations

Cybersecurity governance: A path to cyber maturity

Free cybersecurity tools you should know about

Key cybersecurity metrics and KPIs for businesses to track

Dig Deeper on Risk management