The Office Workplace ln The Hybrid World

The pandemic has redefined what it means to have a team in the office. In today’s typical work environment, a ‘team’ now involves collaboration between employees across multiple locations and settings.

However, with that comes a new challenge: securing this worldwide office. For example, cyber attacks have risen by 238% since the start of the pandemic and home workers have become the primary target of cyber criminals.

It’s increasingly important for leaders to ensure a consistent office experience regardless of where the workforce is. Enterprise IT governance needs to adapt to this new paradigm with businesses treating management of remote workers as a priority.

The Ability To Work Securely From Anywhere

In the past, corporate IT security would trust every user equally inside their network mainly driven by office-based employees accessing the corporate networking environment from traditionally “safe” locations. As a result of remote working, one key shift that business leaders should consider is “zero trust “networking.  

Zero-Trust Network Access (ZTNA) works by granting access to networks based on the identity of the user and their context (e.g. which applications being accessed). Users are first classified based on their business roles and the levels of access they require. Next, the context of the request is assessed – like where the user is connecting from, through what device, and whether the device is secure. The key aspect of ZTNA is the concept of “never trust, always verify” which means the user access session is continuously verified.

This way, users can access their resources quickly and efficiently, no matter where they are. At the same time, IT leaders can maintain a zero-trust approach across their entire network for enhanced security of vital corporate IT and data resources.

Adopting these frameworks will result in increased agility, resilience and reliability, as well as the ability to prioritize traffic to key applications and securely access SaaS and cloud applications across the Internet. Given the effective access security, it will also provide a good user experience for employees, allowing them to work securely regardless of location.

Deep Understanding Of User Habits & Organizational Needs 

It is critical to strike the right balance between user access management and effective, secure remote access to on-premises resources, hybrid cloud environments, and business applications. But before initiating any policies to do so, leaders need to run a deep audit to continually review and assess their internet-based and cloud-centric application environment and understand how their end-users engage with them. 

Adoption of ZTNA takes some consideration around tailoring the capability to the specific needs of the organization. IT leaders should use this opportunity to question everything, from the organization’s information and communications technology strategy to current IT governance – and, in the process, identify gaps and opportunities to enhance. 

A More Educated Remote User

The single best tactic for keeping confidential data safe is remote user awareness. Keep employees informed – not only about what they should do but also about why they need to do it. And if done right, you’ll set the organization up for success. 

Training materials should focus on the employee’s understanding of the importance of data security and cyber hygiene. Leaders should also consider defining an Acceptable Use Policy, so employees know what websites, apps and networks are permitted for accessing data.

A network with more intelligence at its edge that balances performance with user, device and application security management will be key to navigating the new hybrid way of work and ensuring a ubiquitous office. To succeed in this current era of work, companies must adapt their networking approach to this new distributed environment to avoid putting the productivity of employees and the security of their business at risk.

Samir Desai is VP of product management at GTT

You Might Also Read: 

Building An Identity-First Security Strategy:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Virtual & Real Cybersecurity Threats In The Metaverse 
Big British High Street Retailer Attacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.

Atumcell

Atumcell

Atumcell’s targeted risk assessment exposes emerging threats before they cause harm.

Point3 Security

Point3 Security

Point3 Security is a premier information security organization that provides the industry with the talent screening and analytical tools to enhance its workforce.