Exhibitor Press Releases

Subpage Hero

     

23 Feb 2022

How to manage the security risk of remote working

Hyve Managed Hosting Stand: C650
How to manage the security risk of remote working

Even businesses that are keen to get workers back into the office as soon as possible are at least keeping the door open concerning remote working. According to a new report by Gartner, more than 80% of employees worldwide are expected to be given the opportunity to work from home at least once per week after we’ve emerged from the pandemic. It has never been clearer – remote working is here to stay. But are businesses adequately prepared to facilitate it long-term?

Even businesses that are keen to get workers back into the office as soon as possible are at least keeping the door open concerning remote working. According to a new report by Gartner, more than 80% of employees worldwide are expected to be given the opportunity to work from home at least once per week after we’ve emerged from the pandemic. It has never been clearer – remote working is here to stay. But are businesses adequately prepared to facilitate it long-term?

So, now that businesses have had time to navigate the choppy waters of the pandemic and adapt their processes, many will be turning their attention to creating a long-term, sustainable, secure hybrid-working environment. They need a modern cybersecurity strategy that is up to date and fit for purpose, particularly at a time when cybercrime is rising across the board. According to the Identity Theft Resource Center (ITRC), the number of data breaches reported in 2021 eclipsed that of 2020 by as early as October. Clearly, there is work to be done. So where should businesses be focusing their cybersecurity efforts?

Misconfigurations and human error
You may be surprised to learn that a staggering 65% of cloud network security breaches are due to user error. Misconfigurations are by far the most persistent human error issue, leading to everything from accidental compliance violations and unplanned outages, right through to leaving the door wide open for bad actors and malware. Some of the most common security misconfigurations include overly permissive access, such as giving employees at a lower security grade more access than they need to ‘cover them’ long-term; opening ports to known vulnerable hosts; creating rules that bypass the proxy and violating egress policies; and offering access to a zone, subnet or host where it’s not needed. Even prior to the pandemic, back in 2018, IBM revealed a startling 424% year-on-year increase in data breaches due to misconfigurations caused by human error.

Security gating that’s based on users rather than devices
One statistic that’s guaranteed to send a shiver down the spines of CTOs and CISOs everywhere is that more than a fifth of remote working employees report that their work devices are also used regularly by their family members. This is a common occurrence when security policies are based solely on devices rather than the users of those devices. It’s one thing to limit access to sensitive applications or data to one device, but if that device is being at home and is left logged in, anybody can access it. What’s more, staff may choose to log into their devices to give access to other members of their household, however this is more to do with staff training than it is with security configuration. Businesses are used to taking a ‘least privilege’ or zero-trust approach when it comes to giving devices access to their networks – they should take the same approach with humans.

Using the cloud to its fullest potential

Remote access, by its very nature, is less secure than on-site access. But that doesn’t have to be the case. Smart use of virtual private networks (VPNs) and remote desktop virtualization can give employees the in-house experience while they work remotely, both in terms of performance and security. Tooling up with VPNs and antivirus software will make even less secure channels like WhatsApp and Slack less exposed, keeping your sensitive data secure.

There are inherent risks associated with remote working, but with the right security policies, training and technologies in place these risks can be heavily mitigated. While some businesses might be looking at broadscale SD-WAN or SASE adoption, those that aren’t can still pave the way to a more resilient and sustainable future by embracing tools that are already at their disposal. We’re past the point where remote working can be regarded as temporary, so it’s time to evolve from temporary security fixes.

Loading

2022 Sponsors

Tech Show London Sponsor + VIP Lounge Sponsor

  • IBM

 

Tech Main Stage Sponsor

  • Oracle

 

Stream Sponsors

  • Veeam
  • Saleforce

 

Platinum sponsors

  • Wasabi
  • Splashtop
  • bmc
  • github
  • Ionus

 

Gold sponsors

  • aiven
  • ninja
  • appvia
  • ridge
  • bitrise
  • suse
  • catonetworks
  • checkmarx
  • circlec
  • cloudeq

 

Silver sponsor

  • Sonatype

 

Exhibitors

  • revdebug
  • rookout
  • db sytel uk
  • yugabyte

 

2022 Partners

Media Partner

  • Trusted Computing Group
  • Top Business Tech
  • FinTech Circle
  • Elite Business
  • EM360
  • Cloud Industry Forum

 

Media Partner

  • Linux
  • ADMIN Magazine
  • Media Planet
  • Computer Weekly

 

Media Partner

  • Media7
  • Network Computing
  • Coin Mercury
  • Government Business Magazines
  • it-schulungen.com

 

Media Partner

  • CryptoNewsZ
  • CIOInsights
  • Cyber Security Jobsite

 

Media Partner

  • Electronic Specifier
  • Startups Magazine
  • TechUK
  • Packt
  • DevITJobs

 

Newsletter Sign Up