ESET: Home? Office; Or both?

How can organizations reduce the risk of a cyber attack when an ever-changing mix of employees moves in and out of the office?

The pandemic may be receding, but distance work has come to stay. In this environment, the hybrid work model seems to stand out, with a large number of staff working from home a few days a week, but also having to come to the office the rest.cyber security

The solution of the hybrid work model will combine the advantages of "both worlds" for the staff and the employers. But as we have seen from the beginning of the pandemic, distance work has created the perfect conditions for cybercriminals.
The hybrid working model comes bundled with some security challenges
So how big is the risk for organizations as they adopt a new work model?

ESET research found that 80% of businesses globally believe that employees who work from home have the knowledge as well as the required to address cyber threats.

However, in the same study, three-quarters (73%) of businesses admitted that they were likely to experience a cyber security incident, and 50% said they had already been the victim of a cyber attack in the past.

Certainly, this divergence of views does not contribute to the development of a concise cyber security plan.

The fact is that companies face major challenges – many of which were seen during the of 2020 and the first part of 2021.

These challenges include:

The human factor

Ask any cybersecurity professional and they will probably tell you that the weakest link in the corporate security chain is the employee himself.

That is why we have seen e-fishing campaigns being used extensively in the early days of the pandemic to entice users who were feeling hopeless after the latest crisis news.

In April 2020, Google claimed to be isolating more than 240 million COVID-related spam emails and 18 million phishing or malware emails each day.

We have not realized this, but those who work from home are more at risk because they may be distracted by roommates or family members, and therefore more likely to click on malicious links. Communicating with IT support or checking a suspicious email from a colleague can be difficult when working remotely, and personal laptops and home networks can also offer less protection against malware.

In fact, now that employees are slowly returning to the office, there is concern that they may bring with them bad habits they have adopted over the past 18 months.

Challenges in technology and

During the pandemic the remote work infrastructure was exposed. ESET reported a 140% increase in RDP attacks in the third quarter of 2020.
At the same time, last year the widespread adoption of new cloud services attracted the attention of cybercriminals. It is characteristic that 41% of the companies that participated in of the Cloud Industry Forum still believe that the office is a safer environment than the cloud.

Additionally, a hybrid workplace will undoubtedly require even more data transfer between remote workers, cloud servers, and office-based employees. This complexity will require careful .

How to design a safer hybrid workplace?

The good news is that while protecting the new hybrid workplace will be difficult, there are best practices that can guide corporate cybersecurity executives.

In this context, the model (Zero Trust) is gaining popularity as a way to manage office workers and those working from home through cloud-based systems.

Today, there should be no blind στις συσκευές και τους χρήστες εντός του εταιρικού δικτύου. Για να λειτουργήσει το μοντέλο σωστά, θα απαιτηθούν πολλαπλές τεχνολογίες: από έλεγχο multiple (MFA) and end-to-end encryption, to network detection and response, segmentation strategy and more.

But before they even think about implementing new security controls and technologies, organizations need to write their new hybrid workplace policy from scratch.
This policy should include: access rights for individual employees, remote connection procedures, off-office data management and user cyber security responsibilities, among many other elements.

Finally, the recipe for a successful organizational cyber security policy should include tactics and awareness of all employees.
Because the human factor may be the weakest link in security, but it is also the first line of defense.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
eset, security, iguru, iguru.gr

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).