Securing Hybrid Workplaces From Attack

The Coronavirus pandemic may finally be receding, but it looks certain that remote working is  here to stay.  Since he COVID-19 lockdowns began  cyber crime has increased and remote working has presented increased risks for businesses. 

A new Report by Entrust explores what is needed to perfect the new hybrid work model for sustainability and actions that all organisations and enterprises should consider to secure data in its new infrastructure. 

Cyber crime was already on the rise pre-pandemic and this new research has revealed that 45% of businesses said they had experienced a cyber breach. 

Research by ESET has found that 80% of global businesses are confident their home-working employees have the knowledge and technology needed to handle cyber threats. However, in the same study, three-quarters (73%) admitted they are likely to be impacted by a cyber security incident, and half said they’d already been breached in the past. This kind of disconnect does not make for coherent cybersecurity planning.

The majority of information technology decision makers believe that employees have increased a company’s risk of a security breach by using personal devices for work and downloading software (to do their jobs) not approved by IT. The surge of COVID-19 cases driven by new variants is challenging enterprises’ development of long-term hybrid work models that meet the needs of their businesses and employees. 

Entrust surveyed 1,500 leaders as well as 1,500 full- and part-time employees from 10 countries across four global regions, including the United States, Canada, the United Kingdom, Germany, Australia, Saudi Arabia, the United Arab Emirates, Indonesia, Japan and Singapore. There is a clear trend toward a more distributed workforce with less emphasis on traditional offices. As such, the need for a high standard of security has never been greater. And as the results showed, employees at least say their employers have made inroads to shoring up security. 

Ninety-five percent of leaders said their policies discuss data security and privacy best practices. In addition, 89% of leaders and 87% of employees said they feel confident their company’s data is secure when people work outside the office. But is this confidence warranted? 

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

Throughout the pandemic, bad actors have exploited security deficiencies of remote environments such as insecure home tech hardware, poor password hygiene and employee use of unapproved tools. These cyber attacks will only continue if organisations neglect data security and don’t use data encryption to protect the integrity of communications across hybrid connections. 

In a remote, mobile-centric world where everyone in your company is an endpoint, IT leaders must put some cyber security responsibility into the hands of the very people who may be the most vulnerable, their employees. 

Recent large scale cyber attacks against even the the most highly protected and resilient organisations shows that security issues can happen in any industry. Companies with a security-first culture empower employees at every level of the organisation with security tools that make employee’s lives simpler with great UX and supportive training tailored to specific remote user behaviors and skill sets.

WeLiveSecurity:      InvestisDigital:     Techradar:   Wall Street Journal:   NEBRCentre:     ESET:      Entrust:

Image: Matthew Henry / Burst

You Might Also Read:

Secure Network Access For The Modern Distributed Workforce:

 

« Russia’s Strategy For Information Warfare
Zero Trust - The New Standard Of Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.