Securing Hybrid Workplaces From Attack

Since lockdowns began, cyber crime has increased significantly  and remote working has presented major challenges and much biggest risks for many organisations. The surge of COVID-19 cases driven by new variants has challenged many organisations to quickly devise long-term hybrid work models that meet the needs of their businesses and employees. 

Although the Coronavirus pandemic may be receding it looks like that for many people remote working is here to stay.

ESET research found that while 80% of global businesses are confident their home-working employees have the knowledge and technology needed to handle cyber threats, while research from Entrust has revealed that 45% of businesses said they had experienced a cyber breach. In the same study, three-quarters (73%) admitted they are likely to be impacted by a cyber security incident and half said they’d already been breached in the past. This kind of disconnect does not make for coherent cyber security planning.

The majority of information technology decision makers believe that employees have increased their organisations' risk of a security breach by using personal devices for work and downloading software to do their jobs not approve which in many cases is not approved by their organisation's IT professionals.

Clearly, a new approach is needed to perfect the hybrid work model if it is to to become sustainable and organisations should think carefully about right  actions to securing their data in the new network infrastructure. 

The Entrust Report surveyed 1,500 leaders as well as 1,500 full- and part-time employees from 10 countries across four global regions and found a clear trend towards a more distributed workforce with less emphasis on traditional offices. Ninety-five percent of business leaders said their policies discuss data security and privacy best practices. In addition, 89% of leaders and 87% of employees said they feel confident their company’s data is secure when people work outside the office.

Throughout the pandemic, bad actors have exploited security deficiencies of remote remote environments, such as insecure home tech hardware, poor password hygiene and employee use of unapproved tools. This suggests that the need for a high standard of security has never been greater.

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. In a remote, mobile-centric world where everyone in your company is an endpoint, IT leaders must put some responsibility for cyber security into the hands of the very people who may be the most vulnerable, their employees. 

Companies with a security-first culture empower employees at every level of the organisation with security tools that make employee’s lives simpler with great UX and supportive training tailored to specific remote user behaviors and skill sets.

 ESET:     Entrust:    HRExecutive:      Wall Street Journal:       Techradar:       WeLiveSecurity:    

You Might Also Read:

61% Of Employees Fail A Basic Cyber Security Test:

 

« Russia’s Strategy For Information Warfare
Zero Trust - The New Standard Of Security »

Perimeter 81

Directory of Suppliers

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

SurfWatch Labs

SurfWatch Labs

SurfWatch Labs delivers cyber risk intelligence solutions that help organizations understand the potential for cyber-attacks, determine the impact to their business and proactively address threats.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Provise Consulting

Provise Consulting

ProVise is an independent, product agnostic, research-driven advisory firm specializing in GRC and Cyber Security professional services.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.