‘Polyworking’ is a cybersecurity nightmare waiting to happen
Particularly popular with Gen Z, so-called polyworking brings huge cybersecurity risks
The ‘polyworking’ trend which sees employees working multiple jobs or side gigs at once is creating huge cybersecurity risks, according to new research.
It's a work pattern that's been adopted particularly by Gen Z - those born between 1997 and 2012 - with 48% having some sort of side job, the highest rate among all generations.
However research from Kaspersky warns juggling multiple job roles means navigating an ever-expanding digital environment. Each additional role brings with it a growing number of inboxes, project management tools, communication platforms, and external contacts.
30% off Keeper Security's Business Starter and Business plans
Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?
Cyber attackers can take advantage of this complexity, launching phishing emails through compromised business accounts, embedding malware in fake calendar invites, or sending malicious links via chat apps disguised as legitimate messages from co-workers.
“When your calendar is packed with tasks from three different jobs and you have notifications coming in from five separate apps, and you're also switching between client chats, invoices, and creative work on the same device,” said Evgeny Kuskov, security expert at Kaspersky.
“It's only a matter of time before something slips.”
Over the last year, Kaspersky said it has detected more than six million attacks disguised as platforms or content related to 20 popular work tools. The top targets were Zoom, with 3.8 million attacks, Microsoft Excel, with 835,000, and Outlook with 731,000, followed by OneDrive with 352,080 and Microsoft Teams with 151,800.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
In one scam, users were tricked into downloading a supposed Zoom update from a phishing page, which in reality was malware in disguise.
Meanwhile, job platforms such as Fiverr, Upwork, LinkedIn, and Behance are increasingly being used for phishing schemes disguised as legitimate job offers.
Over the course of the year, Kaspersky said it observed more than 650,000 attempts to visit phishing pages disguised as LinkedIn alone.
Polyworking requires security awareness
Sometimes, Gen Z workers are their own worst enemy, with Kaspersky suggesting that they may frequently reuse passwords or rely on simple, easy-to-remember combinations.
Meanwhile, many polyworkers operate across multiple gigs using the same personal laptop or smartphone, without segmentation between their work and personal environments.
This makes it easy for sensitive client files or corporate credentials to be saved on unsecured devices or public cloud storage solutions like Google Drive or Dropbox.
In some cases, polyworkers also install unauthorized software or browser extensions to streamline their multitasking — 'shadow IT' that may have vulnerabilities or operate with unclear data sharing policies.
"Gen Z’s work-life-tech overlap creates a unique kind of cognitive overload. This constant multitasking increases the risk of mistakes: sending a wrong file to a wrong client, overlooking a phishing email, misconfiguring access permissions," said Kuskov.
"It’s not about carelessness — it’s about the sheer volume of digital demands pulling attention in all directions. And in cybersecurity, even one small lapse can have big consequences."
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
NHS supplier DXS International confirms cyber attack – here’s what we know so farNews The NHS supplier says front-line clinical services are unaffected
-
LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users – here’s how the incident unfoldedNews The impact of the LastPass breach was felt by customers as late as December 2024
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teamsNews A new ISC2 survey indicates that both layoffs and budget cuts are on the decline
-
NCSC issues urgent warning over growing AI prompt injection risks – here’s what you need to knowNews Many organizations see prompt injection as just another version of SQL injection - but this is a mistake
-
Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a timeNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
-
AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals — and teams at Amazon are already seeing huge gainsNews AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals, and the company has already unlocked significant benefits from the technology internally.



