Growth of the gig economy comes with a cybersecurity threat

The UK currently has around 2 million freelancers, and in the coming years the number of gig economy workers is forecasted to continue its meteoric rise. The growth of freelancing however comes with a threat to cybersecurity, warns an IT security expert.
Global digitalisation and widening opportunities to work independently fuel growth of the gig economy. Research carried out by the Association of Independent Professionals and the Self-Employed (IPSE) revealed that in the United Kingdom, the Netherlands and France, the growth of freelancers had surpassed the growth of overall employment. The trend indicates that traditional businesses are losing control over their employees’ workplace security status, while the safety of sensitive corporate data is being laid into freelancer’s hands.
The expansion of the gig economy is also stimulated not only by freedom-seeking professionals but also lean-thinking businesses. Outsourcing tasks and responsibilities to freelance workers provides companies with more flexibility to control costs, working hours, and more. However, this also means that they become clients, and must open part of their internal resources to those who have limited or no direct liability to their business.
“Internally, companies develop strict security procedures for their employees and invest in expensive security systems. However, when it comes to outsourcing, companies lose control of any data they share with the outsiders,” says Naomi Hodges, Cybersecurity Advisor at Surfshark. “Generally, it is the same as leaving the backdoors unlocked in a fort.”
She says that when outsourcing business functions, most companies rely on confidentiality agreements. However, the increasing occurrences of data breaches demonstrate that potential financial and reputational losses are, in most cases, much higher than any agreement can cover. Even in an office setting, employees remain the weak link. Phishing attacks are incredibly frequent and, as practice shows, not even the big corporations are entirely safe from determined hackers. For a phishing scam to work, one leak is enough. However, the information security assurance gets even more complicated to maintain in case of freelancers.
The disregarded data security risk
A vast majority of freelancers choose to work remotely – in coworking spaces, cafes, or anywhere where there is decent Wi-Fi. They invest in getting the necessary tools for work, such as computers, software, and other devices. However, security of those devices is often omitted from their to-do lists.
“Almost anyone with some basic technical knowledge can crack the connection of public Wi-Fi after watching a step-by-step tutorial on YouTube. The hackers can see anything that is being sent to or coming from the computer using the network. If a freelancer does not encrypt its traffic, all their documents and files are put on public display,” explains Naomi Hodges.
The growth of the gig economy means that the number of vulnerable individuals is also growing. Freelancers who do not protect their devices are putting themselves and their clients at risk of data breaches, leaks of confidential information, and more.
How to secure freelancers
Companies usually enforce security and privacy on a network level. Since it gets complicated to replicate it when working with freelancers, business should require them to have security implemented at least on the device level, as even one vulnerable device can easily allow accessing confidential files and accounts. Naomi Hodges says, that although there are several solutions to encrypt any device’s data traffic, virtual private network (VPN) software is one of the most advanced and easiest to use. In addition to protecting from online snooping, VPN shields from malware attacks and surveillance.
“It does not matter if a freelancer is a business consultant, an engineer, or a photographer. They all work with information which can be classified as sensitive to their clients,” explains Naomi Hodges. “Usually, it’s not too difficult to indicate their clients simply by looking at their portfolios. They all count on luck that nobody is interested in his or her files, but that is why data breaches happen.”
A reliable VPN service can benefit both the freelancer and their employer. As an inexpensive tool, it can offer secure browsing while on public or home Wi-Fi, as well as ensure the user’s digital privacy. Connecting to a specific country’s service allows the user to work seamlessly while traveling abroad, especially if they need information which is only available in their home country.
If business managers who work with outside suppliers, such as freelancers or agencies, do not require them to have any security assurance apart from confidentiality agreements, it should be a responsibility of a reliable freelancer to ensure that their client’s data is safe.
Source consultancyuk
Industry: Cyber Security News

Latest Jobs
-
- CIAM Architect Azure B2C
- N/A
- N/A
-
We are seeking a highly skilled and experienced Azure B2C CIAM Architect for a contract starting on Jan 2024. As an Azure B2C CIAM Architect, you will be responsible for designing, implementing, and deploying an new Azure B2C Solution . Responsibilities: Design and implement an Azure B2C-based CIAM solution that meets the needs of our clients organization. Maintain and support the Azure B2C-based CIAM solution. Provide training and support to our employees on the use of the CIAM solution. Background designing, implementing, and maintaining CIAM solutions. Experience with cloud-based identity and access management (IAM) solutions. Experience with OAuth, OpenID Connect,and SAML. Excellent written and verbal communication skills
-
- Senior IAM Consultant
- Germany
- Upto €110,000 depending on level of position
-
Senior IAM Consultant is needed to help lead and deploy IAM Projects for this expand IAM Consultancy The ideal candidate will have a deep understanding of IAM concepts and technologies, as well as experience in deploying and managing complex IAM solutions. Responsibilities Lead the deployment of IAM solutions for our clients Work with clients to understand their IAM requirements and design solutions that meet their needs Configure and implement IAM solutions using best practices Integrate IAM solutions with other enterprise systems Provide training and support to clients on the use of IAM solutions Stay up-to-date on the latest IAM technologies and trends We are looking for an experieneced IAM Consutlatn with: Strong understanding of IAM concepts and technologies,including identity lifecycle management,access control,and authentication Experience in deploying and managing complex IAM solutions Experience with IAM products and solutions,such as SailPoint,One Identity Manager,and Azure Active Directory Excellent communication and interpersonal skills Ability to work independently and as part of a team Fluent in German Candidates witll need to live and have the right to work within Germany to be considered.
-
- Security Architect - SOC Design - Outside IR35 London. SC / DV cleared
- London
- Outside IR35
-
Security Architect - With in-depth SOC Design experience needed for Outside IR35 London. SC / DV cleared. 6 month rolling Immediate Experience delivering technical Security Architecture design / assurance of security design with mobile network experience. HLD / LLD Current SC Clearance a must. Willingness to undertake DV. London 3 days a week Immediately interviewing.
-
- Cyber Security Risk Consultant. UK. Hybrid. Home | Work balance
- United Kingdom
- N/A
-
Cyber Security Consultancy - done the right way. Seeking a passionate Cyber Security Risk Consultant who enjoys helping clients make a different to their business. Warning- if you want a large, slow moving, high politics, high travel security consultancy that demands their a pound of flesh this is NOT for you. A successful individual will have experience working with clients to identify business cyber security risk. This is a remote first opportunity which means you will spend the majority of your time working remotely. You will however spend some time meeting clients as well as meeting up with the team on a monthly basis.. Some of the nice to have certifications. CRISC, ISO27001 Lead implementer, CISA, CISM, CISSP Along with dedicated training budgets, unlimited holiday and a structured career path, this opportunity will give a much needed work life balance. Unable to offer Visa sponsorship now or in the future. Apply and book a call in my diary with the below