The Office Workplace ln The Hybrid World

The pandemic has redefined what it means to have a team in the office. In today’s typical work environment, a ‘team’ now involves collaboration between employees across multiple locations and settings.

However, with that comes a new challenge: securing this worldwide office. For example, cyber attacks have risen by 238% since the start of the pandemic and home workers have become the primary target of cyber criminals.

It’s increasingly important for leaders to ensure a consistent office experience regardless of where the workforce is. Enterprise IT governance needs to adapt to this new paradigm with businesses treating management of remote workers as a priority.

The Ability To Work Securely From Anywhere

In the past, corporate IT security would trust every user equally inside their network mainly driven by office-based employees accessing the corporate networking environment from traditionally “safe” locations. As a result of remote working, one key shift that business leaders should consider is “zero trust “networking.  

Zero-Trust Network Access (ZTNA) works by granting access to networks based on the identity of the user and their context (e.g. which applications being accessed). Users are first classified based on their business roles and the levels of access they require. Next, the context of the request is assessed – like where the user is connecting from, through what device, and whether the device is secure. The key aspect of ZTNA is the concept of “never trust, always verify” which means the user access session is continuously verified.

This way, users can access their resources quickly and efficiently, no matter where they are. At the same time, IT leaders can maintain a zero-trust approach across their entire network for enhanced security of vital corporate IT and data resources.

Adopting these frameworks will result in increased agility, resilience and reliability, as well as the ability to prioritize traffic to key applications and securely access SaaS and cloud applications across the Internet. Given the effective access security, it will also provide a good user experience for employees, allowing them to work securely regardless of location.

Deep Understanding Of User Habits & Organizational Needs 

It is critical to strike the right balance between user access management and effective, secure remote access to on-premises resources, hybrid cloud environments, and business applications. But before initiating any policies to do so, leaders need to run a deep audit to continually review and assess their internet-based and cloud-centric application environment and understand how their end-users engage with them. 

Adoption of ZTNA takes some consideration around tailoring the capability to the specific needs of the organization. IT leaders should use this opportunity to question everything, from the organization’s information and communications technology strategy to current IT governance – and, in the process, identify gaps and opportunities to enhance. 

A More Educated Remote User

The single best tactic for keeping confidential data safe is remote user awareness. Keep employees informed – not only about what they should do but also about why they need to do it. And if done right, you’ll set the organization up for success. 

Training materials should focus on the employee’s understanding of the importance of data security and cyber hygiene. Leaders should also consider defining an Acceptable Use Policy, so employees know what websites, apps and networks are permitted for accessing data.

A network with more intelligence at its edge that balances performance with user, device and application security management will be key to navigating the new hybrid way of work and ensuring a ubiquitous office. To succeed in this current era of work, companies must adapt their networking approach to this new distributed environment to avoid putting the productivity of employees and the security of their business at risk.

Samir Desai is VP of product management at GTT

You Might Also Read: 

Building An Identity-First Security Strategy:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Virtual & Real Cybersecurity Threats In The Metaverse 
Big British High Street Retailer Attacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.