A year ago, IT and cybersecurity teams faced a number of challenges — constantly emerging threats, data privacy regulations, and a significant and widening skills gap, to name a few. Then things really got difficult.
The COVID-19 pandemic and its impact on business processes changed the security dynamic in a big way, making matters even more complex. Shifts to cloud services were accelerated. E-commerce efforts were launched or expanded. COVID-related cyberattacks became common.
But the most significant development was the sudden and massive shift to a remote workforce. Seemingly overnight, employees who’d formerly worked in offices began working from home, many relying on their own computing devices and makeshift network access methods, with IT departments scrambling to protect their devices and data.
As the pandemic enters its second year, it’s worth reviewing some of the security lessons we’ve learned so far and looking ahead at the techniques and technologies that will help protect the future hybrid workplace.
Enterprises should extend endpoint protection tools
For one thing, organizations have discovered that they need to extend the capabilities of their existing security infrastructures in ways they might not have considered before the work-from-home shift. That includes ensuring that corporate security practices and tools that fortify and defend a company’s perimeter can cover a broader range of geographic locations to account for home offices.
“Moving into a remote work environment has meant a change in focus from macro-level security to micro-level extensions of platforms and adoption of new ways of extending a secure environment to remote workers,” says Mark Liggett, CEO of Liggett Consulting and a longtime IT and cybersecurity consultant.
During the past year, the firm has advised companies on extending their endpoint protections and endpoint detection and response tools to their remote users. “This type of change might take negotiation with vendors to add additional licenses for remote users,” Liggett says.
“Some vendors include licensing by user ID rather than device, which can save time and money on deployment. In today’s environment, it is worth a review and pressing for the options that you need to accomplish a secure working environment anywhere,” advises Liggett.
Advanced authentication and access controls are key
Although remote work has added risks, for the most part, companies have been able to mitigate them through modified access controls, strong authentication tools, and emerging technologies, Liggett says. “The use of multifactor authentication and leveraging modern security platforms that feature machine learning and computer behavior monitoring have given additional layers of protection and security into remote connections.”
Ubiquitous VPNs and remote access controls have played important roles in the emergence of widespread remote work, Liggett says, but improvements are on the way. Security teams can expect to see a retooling of remote access and VPN tools, where multifactor authentication plays the key role in authenticating users and providing access controls, he says.
It helps to adopt cloud-first security measures
As the big shift to remote work accelerated companies’ move to cloud-based apps and platforms, cloud-based security has become increasingly important. “Using a cloud application security broker adds additional security and compliance protections into the cloud space,” says Liggett.
In fact, some say the cloud has become an essential part of remote work security. “The pandemic has taught us that a cloud-first security strategy is the future,” says Andrew Hewitt, an analyst at Forrester Research serving infrastructure and operations professionals.
Overreliance on on-premises VPNs and virtual desktop infrastructure “required heroic work from IT practitioners to get them up and running at the start of the pandemic,” Hewitt says. “We expect that cloud-based security solutions such as zero-trust network access and cloud desktops will emerge from this pandemic as clear winners against the on-prem solutions.”
Collaboration tools need shoring up
Companies have also found that online collaboration apps — vital for a remote workforce — come with security risks. “The initial use of these tools was not very secure, either by the delivery of the systems or by the design by the manufacturer,” Liggett says.
In the rush to find a way for at-home employees to hold meetings, for example, many organizations turned to videoconferencing apps, especially Zoom, which was notable for its ease of use. Among other security missteps by the vendor, the Zoom app initially left important security and privacy features turned off by default, leaving inexperienced users vulnerable to uninvited guests.
In response to widespread criticism, Zoom quickly enabled key security features by default, added support for AES 256-bit GCM encryption, and announced that it would add end-to-end encryption in the future. Other videoconferencing vendors have rolled out numerous security enhancements in the past year as well.
“The market demand for security forced change to these systems to [become] a safe and secure way to communicate,” Liggett says, but it’s still incumbent on IT to ensure that the tools are configured for maximum security and that users are trained to use them properly.
Moving forward: Preparing for the hybrid workplace
Because many organizations rushed to support the remote workforce, more work still needs to be done to secure remote environments.
“CISOs were able to increase their 2020 cybersecurity spending to account for the rush to the cloud, the new work-from-home model, and responding to endless phishing attacks,” says Frank Dickson, program vice president, Cybersecurity Products, at research firm IDC. But those investments “extended the existing remote access solutions for the most part,” Dickson says. “There was not time for optimal [protection]. Now, CISOs will have to work to secure the new holes in their security posture that all these rapid changes have no doubt opened up.”
The good news for many security executives is that they will have the resources they need. IDC research shows that secure remote access technology is second only to conferencing platforms in planned enterprise spending increases for 2021, Dickson says.
In addition to shoring up defenses for remote workers, security leaders need to plan for a hybrid work scenario, in which some employees split time between working at home and at a corporate location. That model appears to be here for the long term; Forrester projects that 70% of organizations will have hybrid or “work-anywhere” environments in the future.
The reality of a remote work environment that lacks a true perimeter and can be difficult to control has prompted the emergence of a new market segment that IDC calls pervasive data defense and response platforms.
“These platforms consist of tightly integrated cloud security gateways, data loss prevention platforms, and secure web gateways by leveraging unified user or group policy across the entire security stack, and providing a single reporting mechanism,” Dickson says. This converged security infrastructure shows promise in reducing the complexity of managing data governance policies across hybrid and multicloud environments, he says.
Vendors such as McAfee, Symantec, and Forcepoint are addressing this segment, Dickson says. McAfee’s Unified Cloud Edge platform provides cloud-native security that enables data and threat protection controls for devices and cloud services. Symantec’s integrated data loss prevention platform also provides data and threat protection controls for devices and cloud services. Forcepoint’s approach is designed to appeal to organizations that want a strong security posture with tight monitoring over employees to prevent insider threats.
In the coming months, companies should look at new ways to manage and support their workforce from users’ locations, Liggett says. “The continuous improvement in the SD-WAN space has promise for extending secure network access above and beyond the capability of VPN,” he says. He also expects to see companies investing in cloud and edge computing platforms to further enhance security for remote connections.
“I have a philosophy: any data, anywhere, anytime, any device — and it should be done securely,” Liggett says. “Following this path has been advantageous in [this] time of uncertainty. It continues to pay dividends as we further leverage technology to remove barriers of distance.”
Copyright © 2021 IDG Communications, Inc.
An outstanding share! I’ve just forwarded this onto a coworker who had been doing a little research on this.
And he in fact bought me lunch due to the fact that I stumbled
upon it for him… lol. So let me reword this….
Thanks for the meal!! But yeah, thanx for
spending some time to talk about this matter here on your site.
It is not my first time to pay a quick visit
this web site, i am browsing this web site dailly and get fastidious data from here all the time.
My brother recommended I might like this blog.
He used to be entirely right. This submit actually
made my day. You cann’t consider just how so much time I had spent for this info!
Thanks!
Hello! This post could not be written any better! Reading through this post
reminds me of my old room mate! He always kept talking about this.
I will forward this page to him. Fairly certain he will
have a good read. Many thanks for sharing!
Feel free to visit my blog post; Jannette
Quaⅼity rticles iss the important to invite the
visitorѕ to goo to see tһhe web site, that’s what this websiite is providing.
Hey there! This is kind of off topic but I need some guidance
from an established blog. Is it very hard to set up your own blog?
I’m not very techincal but I can figure things out pretty fast.
I’m thinking about setting up my own but I’m not sure where to begin. Do you have any ideas or suggestions?
Thanks
Here is my webpage :: anapa-alrosa.com.ru
I seriously love your blog.. Pleasant colors & theme.
Did you make this web site yourself? Please reply back as I’m looking to
create my own website and would love to learn where you got this from or
just what the theme is called. Many thanks!
Look at my web site :: 918kiss plus demo id
Thanks for the auspicious writeup. It in truth was
a entertainment account it. Glance complex to far delivered agreeable from you!
However, how can we keep in touch?
my web-site; game rollex11
whoah this blog is wonderful i like studying your articles.
Keep up the great work! You know, many persons are looking round for this info, you can help them greatly.
Visit my webpage :: welcome bonus 100 slot singapore
It’s in point of fact a great and helpful piece of information. I
am satisfied that you just shared this useful
info with us. Please stay us informed like this. Thanks for
sharing.
Review my site: cara masuk id test 918kaya
Hi! I know this is somewhat off topic but I was wondering which blog platform are you using
for this site? I’m getting tired of WordPress because I’ve
had problems with hackers and I’m looking at options for another platform.
I would be great if you could point me in the direction of a
good platform.
Feel free to surf to my site – xe88 Game
Thanks for ones marvelous posting! I certainly enjoyed reading it, you will be a great author.
I will always bookmark your blog and will often come back someday.
I want to encourage you to continue your great writing, have
a nice weekend!
Check out my blog post; mpc-install.com
What’s up to all, how is everything, I think every one is
getting more from this site, and your views are pleasant in favor of
new people.
Look into my web blog: Julianne
I as well as my guys happened to be going through the excellent tips
and hints from your web blog and so unexpectedly I had a horrible suspicion I had not thanked the site owner for those tips.
The young boys were as a consequence very interested to read them and
have in effect in truth been enjoying those things. I appreciate you for
turning out to be indeed thoughtful and also for deciding on this kind of good subject areas millions
of individuals are really eager to know about. Our sincere
apologies for not saying thanks to you sooner.
my homepage; mpc-install.com
This piece of writing will assist the internet viewers for
setting up new weblog or even a weblog from start to end.
My blog post http://www.aniene.net
As I site possessor I believe the content material
here is rattling excellent , appreciate it for your hard work.
You should keep it up forever! Good Luck.
Here is my webpage; https://www.qijiang520.com/thread-107623-1-1.html
I couldn’t resist commenting. Very well written!
Feel free to visit my web site http://www.lubertsi.net/modules.php?name=Your_Account&op=userinfo&username=WitherspoonLauren
This web site really has all the information and facts I wanted
about this subject and didn’t know who to ask.
My web blog; Gudrun
Appreciation to my father who stated to me regarding this website, this blog is actually remarkable.
Also visit my page :: https://lovegamematch.com
21399 768114As I web site possessor I believe the content matter here is rattling magnificent , appreciate it for your hard function. You must keep it up forever! Finest of luck. 392188
168549 826631I enjoy this internet site, will definitely arrive back. Make confident you carry on writing high quality posts. 634514
283150 574028I like the valuable info you offer in your articles. Ill bookmark your blog and check again here frequently. Im quite certain I will learn a lot of new stuff correct here! Very good luck for the next! 616913
839472 232462of course like your web-site however you need to check the spelling on quite some of your posts. Several them are rife with spelling issues and I to find it extremely bothersome to inform the reality however Ill surely come back again. 267046
751625 899310Overall, politicians are split on the issue of whether Twitter is more for business or individual use. The first thing may be the fact which you can build up quite a large following of individuals. 692243
479159 168916I conceive this site has got some real wonderful details for everybody : D. 160542
711374 367932Spot up for this write-up, I genuinely believe this internet website requirements a terrific deal far more consideration. Ill likely to finish up again to read a great deal more, a lot of thanks for that data. 997918
There’s definately a great deal to find out about this subject.
I really like all the points you’ve made.
Hola! I’ve been following your website for a while now and finally got
the courage to go ahead and give you a shout out from Lubbock Texas!
Just wanted to say keep up the fantastic job!
Hello! I know this is kinda off topic nevertheless I’d figured I’d ask.
Would you be interested in trading links or maybe guest authoring a blog
article or vice-versa? My website covers a lot of the same subjects as yours and I believe we could greatly benefit from each other.
If you happen to be interested feel free to shoot me an email.
I look forward to hearing from you! Excellent blog by the way!
Hi there everyone, it’s my first go to see at
this web site, and article is really fruitful
for me, keep up posting these posts.
Hi are using WordPress for your site platform?
I’m new to the blog world but I’m trying to get started and set up my own. Do you need
any coding knowledge to make your own blog?
Any help would be greatly appreciated!