The Cloud Experience Everywhere

So, we're individually responsible for corporate cyber-security?

Fred works in the marketing department for a large enterprise organization. Now, he has to work from home. The amount of email traffic to his inbox never slows down, so to keep up he must scan. He gets mail from multiple vendors confirming purchase orders or invoices. The email address from one of them looked familiar at first glance. It had a link asking him to confirm the purchase order number.

And then this jumped up on his screen!

Fred was lucky. He didn’t pay enough attention to the email address. It was a phishing attempt, or worse, it could have been malware. Thankfully it was his IT department testing the organization’s cybersecurity. Fred realized that he was the first line of defense against cybercriminals, and how important that is.


Work-from-home about to explode
Prior to the rest-in-place orders of Covid-19, only 3.6% of the U.S. employee workforce was working at home half-time or more.¹ According to a May 2020 survey just about half of employees currently working from home would like to continue permanently.²  Hewlett Packard Enterprise’s CEO, Antonio Neri, is on record as saying that returning to the office will be voluntary.³

Not only are employees en masse wishing to work at home, but there are also clear economic drivers for their employers. But it creates a huge headache for Enterprise IT cybersecurity teams.


What is Cybersecurity?
Employees have to come to recognize they are the front line for cybersecurity, but at the same time, working from home will typically blend their personal data with business data because corporate computers will increasingly be utilized for personal browsing. 

Sofrom the point of view of your average employee, what is cybersecurity?

It describes the technologies, organizational process and access controls that are used to protect data, computers, mobile devices, and networks from attacks. With the vast numbers of office-based employees now working from home, cybercriminals are on the attack, looking for clear vulnerabilities. These take many forms, from hackers trying to gain access to sensitive and valuable data, to tricking users into installing ransomware or any other form of malicious software.

We usually only hear about cybersecurity when an organization has suffered a data breach or when its systems have been successfully attacked. Very recently, a US-based IT services company, with near-to 300,000 employees in 37 countries was recently attacked by Maze ransomware. The entry could literally have been one employee opening the wrong email. Corporate and private data is now at risk of being asked to pay a ransom.


The Do’s and 'Don'ts of Internet Security.

  • Do ensure that sites you visit are safe. It is essential that you are vigilant and only use trustworthy sites.
  • Do make use of strong, unique passwords. Use a different one for each system and site you use and change them regularly.
  • Do keep secure information private. Always think before you share. Who else could see this? What could it be used for?
  • Don't visit sites that contain offensive or illegal material. These sites often contain malicious software that can compromise your systems and expose your organisation to viruses and ransomware.
  • Don't share your passwords with anyone. It is your responsibility to keep them secure and known only to you.
  • Don't download files from an unknown source and never download anything that isn't work-related.

Remember, if you think you've visited a website that has been compromised or if you spot any unusual activity on your systems, do report your suspicions to your cybersecurity department.

You need to be proactive in detecting and reporting any potential threats. Remember, security isn't complete without you.

Don’t be like Fred!

Learn more about IT security risk management from HPE Pointnext Services and how we can strengthen your data’s confidentiality, integrity, and availability.


Ian Jagger
HPE Pointnext Services Digital Transformation Narrator
Hewlett Packard Enterprise



² Grossman survey

³ antonio-neri-returning-to-the-office-will-be-voluntary-


0 Kudos
About the Author


Jagger is a content creator and narrator on the Digital Transformation topic for HPE Pointnext Services. He adds further focus on container and SAP topics. He holds an honors degree in economics, an associate degree in social psychology and a masters in marketing. He is also a Chartered Marketer with the Chartered Institute of Marketing