WFH/WFA Workplace Create New Cybersecurity Threats: Are You Prepared? by@NordVPN Teams

WFH/WFA Workplace Create New Cybersecurity Threats: Are You Prepared?

Gartner: 82% of business leaders plan to let employees continue to work from home (WFH) in at least some capacity, while 47% plan to allow employees to do so permanently. IBM estimates that in 2021 a data breach incident costs enterprises $4.24 million on average. Some companies have turned to the work from anywhere model to give their employees the option of working from an office or home, and even from a geographic location of their own choice. This means that an increasing number of workers will access their online work environment through vulnerable networks.
image
NordLayer HackerNoon profile picture

NordLayer

Advanced network access security for modern workforces

IBM estimates that in 2021 a data breach incident costs enterprises $4.24 million on average. Even though the workforce is returning to offices in varying capacities, research on the topic indicates that managers are planning for a hybrid work future. According to Gartner, 82% of business leaders plan to let employees continue to work from home (WFH) in at least some capacity, while 47% plan to allow employees to do so permanently.Β 

Some companies - Spotify being a notable example - have turned to the work from anywhere (WFA) model to give their employees the option of working from an office or home, and even from a geographic location of their own choice.Β 

Cybersecurity-wise, this means that an increasing number of workers will access their online work environment through vulnerable networks, and additional security measures have to be put in place to mitigate the connected risks.Β 

The risks of a hybrid work environment

The switch to remote work left managers dealing with several cybersecurity threats stemming from unsecured home devices and networks, as well as unprotected internet traffic. When the majority of employees work from a single location, there is only a need to protect the main network - which is less demanding than protecting as many endpoints as there are employees.

"More employees working from anywhere means more devices connecting remotely, i.e., outside of the secured corporate network. As a result β€” businesses' control over data is slipping rapidly," says Juta Gurinaviciute, Chief Technology Officer at NordLayer.

"As such, it is critical to understand what remote workers are doing with that data and rework the new 'normal' to make it more effective and secure," Gurinaviciute says.

The elements that build for security and privacy that may normally be available in a controlled corporate physical environment setting with defined physical barriers are routinely obliterated in WFA environments. And the risks associated with WFH are amplified when the move is made to WFA. This is because it includes not only our home base but also frequently working on the road at customer locations, airports, coffee shops, and just about anywhere with wired or wireless connections.Β 

"Adapting to working from home was a challenge to cybersecurity personnel everywhere, but the growing trend of working from anywhere entails a new set of threats to consider," adds Gurinaviciute.

"Working from anywhere usually means using unencrypted public Wi-Fi, which can lead to information being intercepted, malware being distributed. There is an array of ways in which hackers exploit unsecured public networks, and businesses have to adapt their cybersecurity strategies accordingly."Β 

Adapting cybersecurity protocols

The consequences of poor cybersecurity hygiene while working remotely can include anything from compromised sensitive data to unauthorized access to the organization's infrastructure. Secure communications while working remotely can be ensured by the combination of technical solutions and controls with proper employee operations security (OPSEC).

"Typically, when it comes to securing your teleworkers, the first item on the agenda is developing a corporate policy," says Gurinaviciute.

"This policy should outline what's acceptable in a remote working environment, how data is handled, what levels of authorization are available, etc. Risk-based decisions can also be made depending on the types of devices employees use for teleworking (for example, company-issued devices, personal laptops or smartphones, etc.). Devices that haven't been issued specifically by the company should be subject to more stringent controls," says Gurinaviciute.

Since every remote employee is a potential threat to the integrity of a given company's data, businesses are shifting their cybersecurity strategies away from the castle-and-moat approach.

Previously, companies thought it was enough to have a robust, perimeter defense-oriented approach to cybersecurity. Now, network security solutions based on the Zero Trust principle are replacing traditional, static defense strategies.Β Β Β 

In the Zero Trust framework, the given network is protected by granting users and devices access to only those parts of the network that are essential to their task. In such a system, every user is authenticated before being allowed to access the needed data through an encrypted tunnel. Because of this, even if a device gets compromised, it can't cause network-wide damage.Β 

Organizations that have Zero Trust-based system in place enhance their cybersecurity in three key areas - secure access, secure browsing, and increased cybersecurity training opportunities, adds the NordLayer expert:

"First, a comprehensive security framework of this kind allows the remote employees to safely connect to the company network without putting the whole network at risk.

Second, web browsing becomes considerably safer, allowing cybersecurity personnel to ensure employee browsing habits are not potentially harmful to the company.

Finally, due to the automated nature of Zero Trust-based systems, managers gain more time to educate their personnel on best cybersecurity practices, which is crucial because defrauding humans is one of the chief enablers of successful cyberattacks."

react to story with heart
react to story with light
react to story with boat
react to story with money
L O A D I N G
. . . comments & more!