WFH/WFA Workplace Create New Cybersecurity Threats: Are You Prepared? - Deepstash
WFH/WFA Workplace Create New Cybersecurity Threats: Are You Prepared?

WFH/WFA Workplace Create New Cybersecurity Threats: Are You Prepared?

Curated from: hackernoon.com

Ideas, facts & insights covering these topics:

7 ideas

Β·

269 reads

2

Explore the World's Best Ideas

Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.

WFH/WFA Workplace Create New Cybersecurity Threats

WFH/WFA Workplace Create New Cybersecurity Threats

IBM estimates that in 2021 a data breach incident costs enterprises $4.24 million on average. Even though the workforce is returning to offices in varying capacities, research on the topic indicates that managers are planning for a hybrid work future.

According to Gartner, 82% of business leaders plan to let employees continue to work from home (WFH) in at least some capacity, while 47% plan to allow employees to do so permanently.

5

104 reads

The Security Risk

Cybersecurity-wise, this new development means that an increasing number of workers will access their online work environment through vulnerable networks, and additional security measures have to be put in place to mitigate the connected risks.Β 

5

36 reads

The Risks Of A Hybrid Work Environment

The switch to remote work left managers dealing with several cybersecurity threats stemming from unsecured home devices and networks, as well as unprotected internet traffic.

When the majority of employees work from a single location, there is only a need to protect the main network - which is less demanding than protecting as many endpoints as there are employees

5

24 reads

The Risk Of That Coffee Shop WiFi

The elements that build for security and privacy that may normally be available in a controlled corporate physical environment setting with defined physical barriers are routinely obliterated in WFA environments.

And the risks associated with WFH are amplified when the move is made to WFA. This is because it includes not only our home base but also frequently working on the road at customer locations, airports, coffee shops, and just about anywhere with wired or wireless connections.

5

25 reads

The Need To Adapt

Working from anywhere usually means using unencrypted public Wi-Fi, which can lead to information being intercepted, malware being distributed. There is an array of ways in which hackers exploit unsecured public networks, and businesses have to adapt their cybersecurity strategies accordingly.

Adapting to working from home was a challenge to cybersecurity personnel everywhere, but the growing trend of working from anywhere entails a new set of threats to consider.

5

22 reads

Zero Trust Framework

Since every remote employee is a potential threat to the integrity of a given company's data, businesses are shifting their cybersecurity strategies away from the castle-and-moat approach.

In the Zero Trust framework, the given network is protected by granting users and devices access to only those parts of the network that are essential to their task. In such a system, every user is authenticated before being allowed to access the needed data through an encrypted tunnel. Because of this, even if a device gets compromised, it can't cause network-wide damage.

5

17 reads

Zero Trust-Based Systems: Enhancing Three Key Areas

  1. A comprehensive security framework of this kind allows remote employees to safely connect to the company network without putting the whole network at risk.
  2. Web browsing becomes considerably safer, allowing cybersecurity personnel to ensure employee browsing habits are not potentially harmful to the company.
  3. Due to the automated nature of Zero Trust-based systems, managers gain more time to educate their personnel on best cybersecurity practices

5

41 reads

IDEAS CURATED BY

catherinma

Land/geomatics surveyor

Catherine Martin's ideas are part of this journey:

Hiring Without an Office

Learn more about remotework with this collection

How to build trust in a virtual environment

How to manage remote teams effectively

How to assess candidates remotely

Related collections

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

β€”

100+ Learning Journeys

β€”

Access to 200,000+ ideas

β€”

Access to the mobile app

β€”

Unlimited idea saving

β€”

β€”

Unlimited history

β€”

β€”

Unlimited listening to ideas

β€”

β€”

Downloading & offline access

β€”

β€”

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates