top of page

What dangers come with hybrid working

Due to the COVID-19 pandemic, many organizations shifted to remote working, which resulted in an increase in cyber-attacks targeting remote environments.


The human element in cybersecurity risks and in hybrid working

As a result, it became crucial for companies to take necessary measures to safeguard themselves, their employees, and their clients from data breaches. With the ongoing transition to hybrid working, what are the essential security measures that organizations need to consider to ensure data protection?


The increase in cyber-attacks is a concern


Prior to the COVID-19 pandemic, there was an increase in cyber-attacks aimed at gaining monetary profit, such as through ransomware. Since the pandemic, the shift towards remote work has led to a rise in cyber-attacks targeting vulnerabilities in Virtual Private Networks (VPNs). These attacks have become increasingly sophisticated, with criminal businesses offering "ransomware-as-a-service" to exploit these security gaps. Companies are struggling to manage these risks.


The exchange of files between remote workers can be relatively safe if the same platforms are used, but if different tools are utilized, there is a risk of information being shared in a loose and public manner. Moreover, some individuals participate in online meetings from public places like cafes and parks, which increases the risk of security breaches due to the lack of awareness.


Sometimes, important information is stored in the cloud where it can be accessed. But it's not always clear which information is really important and should be kept secret. So, employees might not know that certain information needs extra protection. The shift to a hybrid work model also increases the risk of employees intentionally or unintentionally taking out internal information. To prevent such incidents, it is important to educate employees and raise security awareness.

Continuous monitoring on things is an important security step


Because there's not enough control over remote work, the idea of 'zero-trust architecture' has become popular in the United States. The principle of this architecture is to grant authority and control access appropriately according to the situation. However, there is a limit and cost to the number of people who can verify this.


Every day, our company gets about 24 trillion pieces of log information, called 'signals.' We look at these using our AI technology. We continuous monitoring the dark web and also we provide tools to check for the common attacks, block bad website links, and make sure our clients are safe.


In the past, we mainly provided support for future cyber-attacks by formulating cyber security strategies. However, the number of clients requiring assistance after experiencing incidents has significantly increased recently. Specifically, there have been many incidents at overseas subsidiaries and affiliates, and clients are requesting guidelines and help to establish global security measures and monitoring schemes.


We currently offer 'security packs' to smartphone and cell phone subscribers, but we aim to develop new services that enhance safety and offer carrier-led services to enable safe remote working. Hybrid work increases the complexity of security measures and the number of targets for attacks. Therefore, it is essential to strengthen our defense measures and monitoring systems to keep up with the shift towards a more flexible and convenient hybrid work model.


The dangers of cyber threats in supply chains


Supply chains can be at risk from cyber attacks, and it's hard to deal with the damage, especially when it hits the security weaknesses of companies abroad that are part of the chain. The importance of security varies depending on the country or region where group companies are located, and laws, regulations, and mindsets differ as well. Therefore, it's crucial for the head office to understand the unique circumstances of each group company and provide specific security information and support to each, instead of giving blanket instructions that may not be effective.


Most security incidents occur with on-premises systems, which are in-house operated. Smaller companies often use new cloud services to stay safe, but bigger companies are in more danger because they still have outdated IT environments. In the hybridization of cloud and on-premises, it's essential to consider a drastic reform instead of a 50-50 approach, such as a 95-5 ratio.


As data moves to the cloud, it's important to control who can access it, especially for each piece of data. The clearer the data that needs protection, the simpler it is to handle security.


The human element in cybersecurity risks

In the case of cybersecurity, active safety refers to a mechanism or structure that proactively prevents security incidents from occurring. Because mistakes made by people are seen as one of the biggest risks to security, it's really important to get rid of this danger. This means teaching employees how to be better at using technology, both when they're at work and when they're at home.


Many companies struggle with choosing the right security products, and while considering them, they remain exposed to vulnerabilities. Therefore, it is necessary to choose a platform that maximizes security with the concept of built-in security. Depending on the contract with the vendor, it is possible to take advantage of the latest security measures without incurring new costs. By utilizing cloud-based systems, it is possible to build a cyber environment that is free from vulnerabilities.


The quality of security will depend on how management prioritizes cybersecurity as a top business issue. Cybersecurity initiatives will become a differentiating factor for companies and a condition for survival. It is vital for management to prioritize cybersecurity instead of leaving it solely to IT departments and security personnel to handle.

---------------------------------------------------------

◼ Click here to learn more about the training we offer: https://www.thehacktivists.in/trainings

◼ Click here to learn more about the training for cyber security managers: https://www.thehacktivists.in/courses

---------------------------------------------------------

Join our WhatsApp group to connect with experts, share insights, and stay updated on the latest trends.


Let's secure the digital world together!



Commentaires


bottom of page