Addressing demanding cybersecurity situations in a new way of working remotely

The Covid-19 pandemic has affected companies around the world, leading many to adopt mass-range paintings almost overnight.While some organizations were well prepared for this change, many in the past had noticed that only a small percentage of their staff operated remotely.In fact, Leesman’s recent studio of more than 700,000 international painters found that 52% have little or no pleasure in running from home, and even among those who do, 83% do it for a day a week or less.savings start to slowly restart, corporations are now looking for features for staff to safely return to the workplace and the question in many people’s mouths is whether remote paintings are here to stay.

The answer to this query is not simple. Companies will need to take into account a number of points to ensure the good luck of long-term remote work.Unsurprisingly, the radical change facing businesses of all sizes has created a multitude of demanding situations for IT teams.and remains similar to security, with similar disorders to knowledge access control, VPN security, and immediate infrastructure replacements.as well as protect workers and systems from increased cyber risk, as cybercriminals seek to exploit the amplified uncertainty caused by the pandemic.

It is vital that corporations address those security issues now, not only to navigate the existing landscape well, but also to ensure the long term of their organization for what will undoubtedly become a long-lasting replacement in the way we paint. long term.

The lack of preparation that is evident in maximum organizations can leave them unprotected in a number of areas, first of all, from the point of view of device management, given the newly created endpoint network that is very dispersed.to calls from security experts in recent years and have not implemented multi-factor authentication features will be vulnerable to brute force tactics, such as password reuse attacks.More importantly, however, a mindset that sees security as “behind the firewall or not” will result in insufficient controls when it comes to managing the unprecedented combination of BYOD and controlled devices that constitute a remote workforce.

Companies want a series of steps to reduce the potential threat, and a multi-front technique is the most productive strategy. IT groups will need to ensure that the end-to-end tracking team is in position, as home networks are now necessarily an extension of the office.In addition, they also deserve to provide staff with continuing education and recommendations on how to protect their own home networks. This new environment has put some cybersecurity in the hands of remote employees, so they must be prepared to protect themselves and the organization..

In addition, security will need to be extended to the device. This means that the hardware team and allow software updates that can be deployed and scaled seamlessly across all endpoints.For example, Ubuntu Desktop allows users to facilitate unattended updates and Livepatch to protect terminals from emerging threats without any computer intervention.Using a corporate proxy server or VPN can also help protect and monitor the newly expanded network, while users can also allow cheap DNS filtering installations like OpenDNS to prevent access to destructive sites.

Unsurprisingly, VPNs have noticed that their popularity is increasing in today’s climate as they provide secure remote access to employees. According to a recent report, since March, the UK has noticed a 48% increase in professional VPN usage, while internationally.This has been a staggering 165% increase. Beyond popular features like user authentication and layered access control offerings, VPNs can be configured to use a full tunnel for longer business coverage.Examples of this come with the ability to exploit filtering of corporate networks such as intrusion detection and coverage systems (IDS/IPS), plus other situational awareness protocols such as NetFlow to collect and analyze network traffic.However, with such an increase in VPN deployment and in as little time as we have noticed in recent months, there is a greater threat of network segmentation failure, which can disclose company resources to a broader-than-expected scope..

The continued adoption of cloud-based products and facilities is another security issue. Businesses moving to the cloud want to think about how to protect their own facilities and data. With this in mind, the same due diligence is required when opting for a cloud platform that they would use when deploying their own infrastructure. Businesses can also turn to a controlled facilities approach, ensuring that the complexities of their infrastructure and programs In the cloud, in terms of maintenance, security and scalability, they are controlled by a trusted partner, which means that your IT groups can focus on other priorities, especially in these unprecedented times.

Ultimately, the result of this pandemic will be that it will illustrate a new world of long-term prospective paintings, a long-term one where remote paintings are the norm and where Americans and organizations can continue to paint effectively, regardless of their location.Those who may have been reluctant to adopt a remote strategy before, those unprecedented times have shown that running from home can be a successful component of their broader trading strategy.and new access measures will be needed. For IT teams, this poses new security hazards related to overcoming, in order to navigate not only the supply but also in the long term of your business in the long term.

Joe McManus, Director of Security, Canonical

Sign up to get the latest ITProPortal news, as well as exclusive special offers, right to your inbox!

Thank you for registering with IT Pro Portal.You will soon receive a verification email.

There’s a problem. Refresh the page and re-consult.

ITProPortal is from Future plc, a foreign media organization and a leading virtual publisher.Visit our corporate website.

Leave a Comment

Your email address will not be published. Required fields are marked *