Growth of the gig economy comes with a cybersecurity threat
The UK currently has around 2 million freelancers, and in the coming years the number of gig economy workers is forecasted to continue its meteoric rise. The growth of freelancing however comes with a threat to cybersecurity, warns an IT security expert.
Global digitalisation and widening opportunities to work independently fuel growth of the gig economy. Research carried out by the Association of Independent Professionals and the Self-Employed (IPSE) revealed that in the United Kingdom, the Netherlands and France, the growth of freelancers had surpassed the growth of overall employment. The trend indicates that traditional businesses are losing control over their employees’ workplace security status, while the safety of sensitive corporate data is being laid into freelancer’s hands.
The expansion of the gig economy is also stimulated not only by freedom-seeking professionals but also lean-thinking businesses. Outsourcing tasks and responsibilities to freelance workers provides companies with more flexibility to control costs, working hours, and more. However, this also means that they become clients, and must open part of their internal resources to those who have limited or no direct liability to their business.
“Internally, companies develop strict security procedures for their employees and invest in expensive security systems. However, when it comes to outsourcing, companies lose control of any data they share with the outsiders,” says Naomi Hodges, Cybersecurity Advisor at Surfshark. “Generally, it is the same as leaving the backdoors unlocked in a fort.”
She says that when outsourcing business functions, most companies rely on confidentiality agreements. However, the increasing occurrences of data breaches demonstrate that potential financial and reputational losses are, in most cases, much higher than any agreement can cover. Even in an office setting, employees remain the weak link. Phishing attacks are incredibly frequent and, as practice shows, not even the big corporations are entirely safe from determined hackers. For a phishing scam to work, one leak is enough. However, the information security assurance gets even more complicated to maintain in case of freelancers.
The disregarded data security risk
A vast majority of freelancers choose to work remotely – in coworking spaces, cafes, or anywhere where there is decent Wi-Fi. They invest in getting the necessary tools for work, such as computers, software, and other devices. However, security of those devices is often omitted from their to-do lists.
“Almost anyone with some basic technical knowledge can crack the connection of public Wi-Fi after watching a step-by-step tutorial on YouTube. The hackers can see anything that is being sent to or coming from the computer using the network. If a freelancer does not encrypt its traffic, all their documents and files are put on public display,” explains Naomi Hodges.
The growth of the gig economy means that the number of vulnerable individuals is also growing. Freelancers who do not protect their devices are putting themselves and their clients at risk of data breaches, leaks of confidential information, and more.
How to secure freelancers
Companies usually enforce security and privacy on a network level. Since it gets complicated to replicate it when working with freelancers, business should require them to have security implemented at least on the device level, as even one vulnerable device can easily allow accessing confidential files and accounts. Naomi Hodges says, that although there are several solutions to encrypt any device’s data traffic, virtual private network (VPN) software is one of the most advanced and easiest to use. In addition to protecting from online snooping, VPN shields from malware attacks and surveillance.
“It does not matter if a freelancer is a business consultant, an engineer, or a photographer. They all work with information which can be classified as sensitive to their clients,” explains Naomi Hodges. “Usually, it’s not too difficult to indicate their clients simply by looking at their portfolios. They all count on luck that nobody is interested in his or her files, but that is why data breaches happen.”
A reliable VPN service can benefit both the freelancer and their employer. As an inexpensive tool, it can offer secure browsing while on public or home Wi-Fi, as well as ensure the user’s digital privacy. Connecting to a specific country’s service allows the user to work seamlessly while traveling abroad, especially if they need information which is only available in their home country.
If business managers who work with outside suppliers, such as freelancers or agencies, do not require them to have any security assurance apart from confidentiality agreements, it should be a responsibility of a reliable freelancer to ensure that their client’s data is safe.
Source consultancyuk
Industry: Cyber Security News
Latest Jobs
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.
-
- Cyber Security Technical Presales Consultant | UK | Managed Services SOC / Pentesting etc
- England
- N/A
-
Experienced Technical Pre Sales Cybersecurity Consultant to support organisations across the UK. This role focuses on delivering advisory, high level solution design, and security uplift services that improve security outcomes, address operational challenges, and enable informed technology decisions within complex and regulated environments. The position blends technical pre sales expertise with a consultative approach, working closely with technical, operational, and commercial stakeholders to shape effective and scalable cybersecurity solutions such as Managed Services SOC / Pentesting etc The individual must be able to achieve UK Security Clearance. Key Responsibilities Provide technical pre sales support across cybersecurity solutions and services for organisations operating across multiple industry sectors Engage stakeholders to understand security challenges, risks, compliance requirements, and operational pain points Deliver advisory guidance and recommendations to strengthen security posture and organisational resilience Translate customer requirements into clear, outcome focused technical and commercial solution designs Act as a trusted technical advisor throughout the sales and early delivery lifecycle Produce clear technical documentation, recommendations, and customer facing materials suitable for regulated environments Collaborate closely with sales, delivery, and technical teams to align solutions with customer needs Experience and Skills Proven experience in technical pre sales or cybersecurity consultancy Experience working across multiple industries, ideally within regulated or complex environments Broad knowledge of cybersecurity technologies, managed services, and risk based approaches Strong communication skills with the ability to engage both technical and non technical stakeholders Confident operating in a client facing, consultative role UK based role with remote working Occasional travel for customer engagement as required