Securing Hybrid Workplaces From Attack

The Coronavirus pandemic may finally be receding, but it looks certain that remote working is  here to stay.  Since he COVID-19 lockdowns began  cyber crime has increased and remote working has presented increased risks for businesses. 

A new Report by Entrust explores what is needed to perfect the new hybrid work model for sustainability and actions that all organisations and enterprises should consider to secure data in its new infrastructure. 

Cyber crime was already on the rise pre-pandemic and this new research has revealed that 45% of businesses said they had experienced a cyber breach. 

Research by ESET has found that 80% of global businesses are confident their home-working employees have the knowledge and technology needed to handle cyber threats. However, in the same study, three-quarters (73%) admitted they are likely to be impacted by a cyber security incident, and half said they’d already been breached in the past. This kind of disconnect does not make for coherent cybersecurity planning.

The majority of information technology decision makers believe that employees have increased a company’s risk of a security breach by using personal devices for work and downloading software (to do their jobs) not approved by IT. The surge of COVID-19 cases driven by new variants is challenging enterprises’ development of long-term hybrid work models that meet the needs of their businesses and employees. 

Entrust surveyed 1,500 leaders as well as 1,500 full- and part-time employees from 10 countries across four global regions, including the United States, Canada, the United Kingdom, Germany, Australia, Saudi Arabia, the United Arab Emirates, Indonesia, Japan and Singapore. There is a clear trend toward a more distributed workforce with less emphasis on traditional offices. As such, the need for a high standard of security has never been greater. And as the results showed, employees at least say their employers have made inroads to shoring up security. 

Ninety-five percent of leaders said their policies discuss data security and privacy best practices. In addition, 89% of leaders and 87% of employees said they feel confident their company’s data is secure when people work outside the office. But is this confidence warranted? 

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

Throughout the pandemic, bad actors have exploited security deficiencies of remote environments such as insecure home tech hardware, poor password hygiene and employee use of unapproved tools. These cyber attacks will only continue if organisations neglect data security and don’t use data encryption to protect the integrity of communications across hybrid connections. 

In a remote, mobile-centric world where everyone in your company is an endpoint, IT leaders must put some cyber security responsibility into the hands of the very people who may be the most vulnerable, their employees. 

Recent large scale cyber attacks against even the the most highly protected and resilient organisations shows that security issues can happen in any industry. Companies with a security-first culture empower employees at every level of the organisation with security tools that make employee’s lives simpler with great UX and supportive training tailored to specific remote user behaviors and skill sets.

WeLiveSecurity:      InvestisDigital:     Techradar:   Wall Street Journal:   NEBRCentre:     ESET:      Entrust:

Image: Matthew Henry / Burst

You Might Also Read:

Secure Network Access For The Modern Distributed Workforce:

 

« Russia’s Strategy For Information Warfare
Zero Trust - The New Standard Of Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

CASES.lu

CASES.lu

CASES.lu is a government-driven initiative offering awareness-raising, a web resource and other tools to assist SMEs concerning information security.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Tutanota

Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.