Integrated technologies are much more than just the ability to conduct video conferencing on a laptop or smartphone. Done right, it makes it easier to share ideas and build a team, and it also works seamlessly with other elements of your physical space. – Image: Hero Images, courtesy of DIRTT
A multi-layered, zero-trust-integrated, cloud-based security solution is one of the best solutions for hybrid operational security, according to a new report. This is in the context of the hybrid work model that is now considered the new normal of the pandemic era.
According to McKinsey, nine out of ten organizations planned to combine remote and local work in the post-pandemic era. However, this model creates data security issues for enterprises with respect to remote workers accessing the corporate network.
According to the CIRA report on cybersecurity, roughly 30 percent of organizations have experienced a surge in cyberattack attempts since the start of the pandemic. For example, in 2021, attackers sent 61% of malware through cloud apps for remote workers.
When remote work was an attack factor, the average cost of a data breach amounted to 1.07 million dollars. more than when it wasn’t (according to IBM). In addition, two-thirds of the company’s employees use company-issued devices, but 50% of the hybrid workforce say they occasionally use personal devices for work purposes. This highlights the scale of uncontrolled and unmanaged access to the corporate network.
While the lack of suitable technology or resources certainly plays a role in data breaches, employee online behavior is also an important cause. A Verizon report shows that 85 percent of data breaches are due to human error.
Insecure home Wi-Fi networks, the use of personal devices instead of corporate computers, access to sensitive data, and the rapidly expanding use of cloud applications are some of the cybersecurity challenges of hybrid work.
In addition, company data is at risk when remote employees browse unfiltered websites or download potential viruses.
Commenting on these trends, Martynas Paskauskas, Head of Development to NordLayer tells Digital magazine: “Disabled user authentication, lack of end-to-end encryption, infrequent updates, and unsupported data are additional factors that contribute to data leakage and malicious activity during hybrid operation. Phishing emails, physical security, password hygiene and the dangers of public Wi-Fi networks deserve special attention as they are among the most common gateways for cybercriminals.”