{"id":1716,"date":"2022-08-17T08:26:31","date_gmt":"2022-08-17T08:26:31","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1716"},"modified":"2023-07-18T13:26:18","modified_gmt":"2023-07-18T13:26:18","slug":"working-from-home-what-threat-does-it-pose-to-your-information","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/","title":{"rendered":"Working from Home \u2013 What Threat Does it Pose to Your Information?"},"content":{"rendered":"<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1721 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-1536x1536.png 1536w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-1280x1280.png 1280w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3-1920x1920.png 1920w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-3.png 1945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<p>Working from home (WFH) has become a popular and prevalent practice globally. Remote working can provide more flexibility, enhance job performance, and improve work-life balance but there are potential security risks associated with it.<\/p>\n<p>When the COVID-19 pandemic necessitated working from home, information security became an even more significant concern for companies everywhere.<br \/>\nThe need for more stringent and robust cybersecurity to safeguard remote-working staff and protect company information has meant that organizations need more innovative approaches to ward off potential threats, such as putting in a zero-trust framework and identity-centric programs.<br \/>\nBiggest Threats to Information Security While Working from Home.<\/p>\n<p>During Covid-19, there has been a rise in what we call &#8220;social engineering attacks.&#8221; These include phishing, SMS attacks, and scam calls. In 2021, security experts saw a rise in these attempts, which continued into 2022.<\/p>\n<p>Many individuals struggle with computer security. Working from home pushed this issue to the forefront; flawed security procedures and weak defenses in cloud applications make a company that facilitates remote work an attractive target for a malicious attacker.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1722 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-1536x1536.png 1536w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-1280x1280.png 1280w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4-1920x1920.png 1920w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-4.png 1945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>1. Unsecured Internet Connectivity<\/strong><br \/>\nPersonal networks that lack adequate security are a significant contributor to the rise in cyber threats that follow remote work. Workers are likely to update their personal devices and virus protection, but they often forget to do so for their home routers. When remote routers are not routinely updated, they are prone to security holes that might result in data leaks.<br \/>\nCorporate networks tend to be equipped with firewalls that analyze traffic and prevent illegal practices, but household routers may lack a firewall, leaving a network vulnerable to attacks.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1720 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-1536x1536.png 1536w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-1280x1280.png 1280w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2-1920x1920.png 1920w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-2.png 1945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<p><strong>2. Weak Passwords<\/strong><br \/>\nA company&#8217;s remote network might still be vulnerable to cyber attacks even if it employs VPNs, firewalls, and other forms of software protection. That is often down to human error, such as workers securing their accounts with simple passwords.<\/p>\n<p>Cyber attackers use several methods to decipher passwords. For example, they will build lists of frequently used passwords that may be exploited to get easy access to accounts with inadequate security.<\/p>\n<p>The use of recurring passwords is another unsafe technique often exploited by hackers. After cracking the password for one account, hackers will attempt to access additional accounts using the same credentials. Employees who reuse passwords, particularly between personal and professional accounts, are more likely to have their work accounts compromised.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1723 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-1536x1536.png 1536w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-1280x1280.png 1280w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5-1920x1920.png 1920w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-5.png 1945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>3. Excessive use of Online Tools<\/strong><br \/>\nOrganizations are far more vulnerable to cyber threats due to a growing dependence on technology and internet tools. Online tools and services like Teams, Zoom, Hangouts, and Asana, are used to perform an increasing number of activities, in addition to emails, uploads, chat logs, and cloud storage. It certainly provides cybercriminals with an additional gateway to corporate accounts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1724 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-1536x1536.png 1536w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-1280x1280.png 1280w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6-1920x1920.png 1920w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-6.png 1945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>4. Sharing Unencrypted Files<\/strong><br \/>\nOrganizations might think to encrypt data stored on their network, but fail to encrypt data sent from one location to another.<\/p>\n<p>Since workers often exchange sensitive data like customer account details, corporate files, and more, you must take precautions to prevent cybercriminals from gaining access to this data. Loss, identity theft, ransomware attacks, and other crimes may result from the exposure of confidential firm data.<\/p>\n<p><strong>Conclusion<\/strong><br \/>\nRemote and freelance working is here to stay, and it&#8217;s possible to maintain the same level of security as an office with a high-tech fence around it.<br \/>\nFreelancers and those who work from home have unique challenges regarding securing themselves and their data online. Some of us have in-house IT departments to protect our networks, but freelancers must rely on their own wits and industry standards.<br \/>\nThe best way to protect oneself remotely is to install security patches, secure your network, and stay away from phishing sites. However, employing open-source tools and encrypting your information are significant steps for security-conscious remote workers.<\/p>","protected":false},"excerpt":{"rendered":"<p>Working from home (WFH) has become a popular and prevalent practice globally. Remote working can provide more flexibility, enhance job&#8230;<\/p>","protected":false},"author":26,"featured_media":1725,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37,35,36],"tags":[],"class_list":["post-1716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-latest-news","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Working from Home \u2013 What Threat Does it Pose to Your Information? - Techknowledge<\/title>\n<meta name=\"description\" content=\"Remote working can provide more flexibility, and improve work-life balance but there are potential security risks associated with it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Working from Home \u2013 What Threat Does it Pose to Your Information? - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Remote working can provide more flexibility, and improve work-life balance but there are potential security risks associated with it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-17T08:26:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-18T13:26:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1945\" \/>\n\t<meta property=\"og:image:height\" content=\"1945\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/\",\"name\":\"Working from Home \u2013 What Threat Does it Pose to Your Information? - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png\",\"datePublished\":\"2022-08-17T08:26:31+00:00\",\"dateModified\":\"2023-07-18T13:26:18+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"description\":\"Remote working can provide more flexibility, and improve work-life balance but there are potential security risks associated with it.\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png\",\"width\":1945,\"height\":1945},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Working from Home \u2013 What Threat Does it Pose to Your Information?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Working from Home \u2013 What Threat Does it Pose to Your Information? - Techknowledge","description":"Remote working can provide more flexibility, and improve work-life balance but there are potential security risks associated with it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/","og_locale":"de_DE","og_type":"article","og_title":"Working from Home \u2013 What Threat Does it Pose to Your Information? - Techknowledge","og_description":"Remote working can provide more flexibility, and improve work-life balance but there are potential security risks associated with it.","og_url":"https:\/\/b2btechknowledge.net\/de\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/","og_site_name":"Techknowledge","article_published_time":"2022-08-17T08:26:31+00:00","article_modified_time":"2023-07-18T13:26:18+00:00","og_image":[{"width":1945,"height":1945,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"John Gallacher","Gesch\u00e4tzte Lesezeit":"4 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/","name":"Working from Home \u2013 What Threat Does it Pose to Your Information? - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png","datePublished":"2022-08-17T08:26:31+00:00","dateModified":"2023-07-18T13:26:18+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"description":"Remote working can provide more flexibility, and improve work-life balance but there are potential security risks associated with it.","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Untitled-1945-\u00d7-1945px-7.png","width":1945,"height":1945},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/working-from-home-what-threat-does-it-pose-to-your-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"Working from Home \u2013 What Threat Does it Pose to Your Information?"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/1716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=1716"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/1716\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/1725"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=1716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=1716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=1716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}