Curated from: hackernoon.com
Ideas, facts & insights covering these topics:
7 ideas
Β·269 reads
2
Explore the World's Best Ideas
Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.
IBM estimates that in 2021 a data breach incident costs enterprises $4.24 million on average. Even though the workforce is returning to offices in varying capacities, research on the topic indicates that managers are planning for a hybrid work future.
According to Gartner, 82% of business leaders plan to let employees continue to work from home (WFH) in at least some capacity, while 47% plan to allow employees to do so permanently.
5
104 reads
Cybersecurity-wise, this new development means that an increasing number of workers will access their online work environment through vulnerable networks, and additional security measures have to be put in place to mitigate the connected risks.Β
5
36 reads
The switch to remote work left managers dealing with several cybersecurity threats stemming from unsecured home devices and networks, as well as unprotected internet traffic.
When the majority of employees work from a single location, there is only a need to protect the main network - which is less demanding than protecting as many endpoints as there are employees
5
24 reads
The elements that build for security and privacy that may normally be available in a controlled corporate physical environment setting with defined physical barriers are routinely obliterated in WFA environments.
And the risks associated with WFH are amplified when the move is made to WFA. This is because it includes not only our home base but also frequently working on the road at customer locations, airports, coffee shops, and just about anywhere with wired or wireless connections.
5
25 reads
Working from anywhere usually means using unencrypted public Wi-Fi, which can lead to information being intercepted, malware being distributed. There is an array of ways in which hackers exploit unsecured public networks, and businesses have to adapt their cybersecurity strategies accordingly.
Adapting to working from home was a challenge to cybersecurity personnel everywhere, but the growing trend of working from anywhere entails a new set of threats to consider.
5
22 reads
Since every remote employee is a potential threat to the integrity of a given company's data, businesses are shifting their cybersecurity strategies away from the castle-and-moat approach.
In the Zero Trust framework, the given network is protected by granting users and devices access to only those parts of the network that are essential to their task. In such a system, every user is authenticated before being allowed to access the needed data through an encrypted tunnel. Because of this, even if a device gets compromised, it can't cause network-wide damage.
5
17 reads
5
41 reads
IDEAS CURATED BY
Learn more about remotework with this collection
How to build trust in a virtual environment
How to manage remote teams effectively
How to assess candidates remotely
Related collections
Similar ideas
5 ideas
6 ideas
The Essential Guide to Infrastructure Security (Edition:-2024 )
cyberinfosecx.medium.com
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
β
100+ Learning Journeys
β
Access to 200,000+ ideas
β
Access to the mobile app
β
Unlimited idea saving
β
β
Unlimited history
β
β
Unlimited listening to ideas
β
β
Downloading & offline access
β
β
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates