Securing Hybrid Workplaces From Attack

The Coronavirus pandemic may finally be receding, but it looks certain that remote working is  here to stay.  Since he COVID-19 lockdowns began  cyber crime has increased and remote working has presented increased risks for businesses. 

A new Report by Entrust explores what is needed to perfect the new hybrid work model for sustainability and actions that all organisations and enterprises should consider to secure data in its new infrastructure. 

Cyber crime was already on the rise pre-pandemic and this new research has revealed that 45% of businesses said they had experienced a cyber breach. 

Research by ESET has found that 80% of global businesses are confident their home-working employees have the knowledge and technology needed to handle cyber threats. However, in the same study, three-quarters (73%) admitted they are likely to be impacted by a cyber security incident, and half said they’d already been breached in the past. This kind of disconnect does not make for coherent cybersecurity planning.

The majority of information technology decision makers believe that employees have increased a company’s risk of a security breach by using personal devices for work and downloading software (to do their jobs) not approved by IT. The surge of COVID-19 cases driven by new variants is challenging enterprises’ development of long-term hybrid work models that meet the needs of their businesses and employees. 

Entrust surveyed 1,500 leaders as well as 1,500 full- and part-time employees from 10 countries across four global regions, including the United States, Canada, the United Kingdom, Germany, Australia, Saudi Arabia, the United Arab Emirates, Indonesia, Japan and Singapore. There is a clear trend toward a more distributed workforce with less emphasis on traditional offices. As such, the need for a high standard of security has never been greater. And as the results showed, employees at least say their employers have made inroads to shoring up security. 

Ninety-five percent of leaders said their policies discuss data security and privacy best practices. In addition, 89% of leaders and 87% of employees said they feel confident their company’s data is secure when people work outside the office. But is this confidence warranted? 

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

Throughout the pandemic, bad actors have exploited security deficiencies of remote environments such as insecure home tech hardware, poor password hygiene and employee use of unapproved tools. These cyber attacks will only continue if organisations neglect data security and don’t use data encryption to protect the integrity of communications across hybrid connections. 

In a remote, mobile-centric world where everyone in your company is an endpoint, IT leaders must put some cyber security responsibility into the hands of the very people who may be the most vulnerable, their employees. 

Recent large scale cyber attacks against even the the most highly protected and resilient organisations shows that security issues can happen in any industry. Companies with a security-first culture empower employees at every level of the organisation with security tools that make employee’s lives simpler with great UX and supportive training tailored to specific remote user behaviors and skill sets.

WeLiveSecurity:      InvestisDigital:     Techradar:   Wall Street Journal:   NEBRCentre:     ESET:      Entrust:

Image: Matthew Henry / Burst

You Might Also Read:

Secure Network Access For The Modern Distributed Workforce:

 

« Russia’s Strategy For Information Warfare
Zero Trust - The New Standard Of Security »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Ping Identity

Ping Identity

Ping Identity is The identity Security Company, our identity and access management platform gives enterprise customers and employees one-click access

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Soverus Security Solutions

Soverus Security Solutions

Soverus cyber security services and solutions include regulatory compliance, risk assessments, audits, security architecture design, solution delivery, technical support and training

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

SterlingRisk Programs

SterlingRisk Programs

Sterling New Age Cyber, Cyber Liability Program. Understanding new Cyber Risks to provide you with the right protection.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.