Remote & hybrid working A
ccording to the Office of National Statistics, 44% of UK workers were classified as remote or hybrid workers in 2023. With remote work remaining the new norm for
many, businesses have had to grapple with the security risks this type of work set-up poses. For example, according to Statista, 72% of security and IT management professionals expressed concerns about the online security risk of employees working at home. With a recent UK Government report finding that one in three businesses as a whole recall experiencing a breach in 2023, the implications are more significant for remote workers with weaker security infrastructure at home. Despite this, the benefits of remote or hybrid work continue to
outweigh the cons for many businesses, so security and IT leaders must work to arm employees with more robust and holistic cybersecurity infrastructure that can withstand increasingly sophisticated cyber-attacks that companies are experiencing. One of the critical messages repeated in the news and among IT security professionals and commentators is that attacks are now no longer a case of if but when, and organisations need to prepare.
Risks of remote working Cyberattacks are unfortunately becoming more and more unavoidable for businesses. With the rise of emerging technology like AI and quantum, attack methods are also increasingly sophisticated. Just last week, Apple announced a new boost to its messaging app’s security to fend off the looming future threat of advanced quantum computing attacks, and we’re seeing businesses across the board prepare for similar scenarios. Alongside the increased rate of phishing, as mentioned
earlier, attacks that are being used to target remote workers and various other risks place businesses at risk of losing sensitive data to criminals due to a remote workforce. Te use of weaker cybersecurity infrastructure and less secure Wi-Fi networks makes them susceptible to cyberattacks, including unauthorised access, data breaches, and malware infections. Human factors like a slower incident response rate and higher
complacency when working at home can also have an impact. With our modern society embracing an ‘always on’ culture, employees are likely used to effortlessly transitioning from personal devices to professional platforms, seamlessly navigating the digital landscape without a second thought. Tis can lull individuals into a false sense of security, which, in a remote work setting, can lead to mistakes or missing the signs of security threats. With this in mind, business leaders need to transform their approach to cybersecurity to meet these modern needs.
Protecting by air gapping Tis is where air gapping comes in. Put simply, air gapping involves the physical isolation of a device or network, preventing it from establishing an external connection, most commonly with the internet. Any network or device leſt connected to the internet is at threat of attack. So, with no connection to the internet, cyber- attacks can be prevented in the first place or stopped in their tracks. Establishing an IT security infrastructure that can reach the
entire digital set-up can be difficult for companies operating with a remote or hybrid workforce, which could be working from
www.pcr-online.biz
anywhere. For businesses handling sensitive data, having the ability to air gap and physically segment all associated devices from the internet on demand, at any time, is crucial in helping prevent the theſt and breach of information. Understandably so, businesses may not want to disconnect their
entire network when an attack is suspected or about to occur. Businesses with air gapping capabilities can segment certain parts of their network, which are most at risk, to reduce to attack surface and allow them to maintain businesses as usual across the rest of the network. Air gapping also does not require a physical presence or
connection to the internet. Te choice to disconnect can be made remotely, instantly, and without an internet connection, meaning business leaders and senior security or IT leaders, when alerted to an attack threat, can make the choice to disconnect all associated devices wherever they are in the world.
Taking a holistic approach to cybersecurity Implementing air gapping technology into a business’s security set-up acts as a first layer of protection. IT security requires a holistic approach, especially when it comes to companies that handle sensitive information on a daily basis. Along with having the right technology in place, fostering a culture of openness and accountability is paramount, empowering remote employees with the knowledge and tools to identify and report security incidents promptly. Organisations should also move from a blame-centric approach to one that encourages, rewards, and normalises open discussion of security concerns and breaches. Training programmes are crucial to this, covering the technical aspects of cybersecurity and addressing the psychological barriers that inhibit reporting. While action is essential for employees, accountability from
leadership is also crucial. Tey must lead by example, demonstrate a commitment to transparency, participate in training, and support staff who escalate concerns. Tis top-down endorsement is critical to cementing the culture change. Te decision to disconnect comes from the C-suite for businesses with the ability to airgap. Tis requires responsibility for security to come from the top-down, rather than resting on the shoulders of IT and security departments, which can also initiate a wider cultural change in the business.
The future of remote work Remote working isn’t going anywhere anytime soon. While some businesses have chosen to return to the office, a more flexible work set-up has stuck, requiring a long-term reassessment of IT security measures to fit the ‘new norm’. Integrating air-gapping technology into a business’s cybersecurity infrastructure is one way to take back control, no matter where employees are based. Balancing security needs with user convenience remains crucial as the remote work landscape evolves. While disconnecting numerous times during a workday might not be the most convenient, it acts as a robust base layer of security. With physical network segmentation capabilities, businesses can choose which parts of their network they want to disconnect, and reduce the potential attack surface, providing IT security professionals, leadership and employees peace of mind and protect the business’s sensitive data.
March/April 2024 | 25
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52