Securing Hybrid Workplaces From Attack

The Coronavirus pandemic may finally be receding, but it looks certain that remote working is  here to stay.  Since he COVID-19 lockdowns began  cyber crime has increased and remote working has presented increased risks for businesses. 

A new Report by Entrust explores what is needed to perfect the new hybrid work model for sustainability and actions that all organisations and enterprises should consider to secure data in its new infrastructure. 

Cyber crime was already on the rise pre-pandemic and this new research has revealed that 45% of businesses said they had experienced a cyber breach. 

Research by ESET has found that 80% of global businesses are confident their home-working employees have the knowledge and technology needed to handle cyber threats. However, in the same study, three-quarters (73%) admitted they are likely to be impacted by a cyber security incident, and half said they’d already been breached in the past. This kind of disconnect does not make for coherent cybersecurity planning.

The majority of information technology decision makers believe that employees have increased a company’s risk of a security breach by using personal devices for work and downloading software (to do their jobs) not approved by IT. The surge of COVID-19 cases driven by new variants is challenging enterprises’ development of long-term hybrid work models that meet the needs of their businesses and employees. 

Entrust surveyed 1,500 leaders as well as 1,500 full- and part-time employees from 10 countries across four global regions, including the United States, Canada, the United Kingdom, Germany, Australia, Saudi Arabia, the United Arab Emirates, Indonesia, Japan and Singapore. There is a clear trend toward a more distributed workforce with less emphasis on traditional offices. As such, the need for a high standard of security has never been greater. And as the results showed, employees at least say their employers have made inroads to shoring up security. 

Ninety-five percent of leaders said their policies discuss data security and privacy best practices. In addition, 89% of leaders and 87% of employees said they feel confident their company’s data is secure when people work outside the office. But is this confidence warranted? 

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

Throughout the pandemic, bad actors have exploited security deficiencies of remote environments such as insecure home tech hardware, poor password hygiene and employee use of unapproved tools. These cyber attacks will only continue if organisations neglect data security and don’t use data encryption to protect the integrity of communications across hybrid connections. 

In a remote, mobile-centric world where everyone in your company is an endpoint, IT leaders must put some cyber security responsibility into the hands of the very people who may be the most vulnerable, their employees. 

Recent large scale cyber attacks against even the the most highly protected and resilient organisations shows that security issues can happen in any industry. Companies with a security-first culture empower employees at every level of the organisation with security tools that make employee’s lives simpler with great UX and supportive training tailored to specific remote user behaviors and skill sets.

WeLiveSecurity:      InvestisDigital:     Techradar:   Wall Street Journal:   NEBRCentre:     ESET:      Entrust:

Image: Matthew Henry / Burst

You Might Also Read:

Secure Network Access For The Modern Distributed Workforce:

 

« Russia’s Strategy For Information Warfare
Zero Trust - The New Standard Of Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Roke Manor Research

Roke Manor Research

Roke Manor Research is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.