Strengthening cybersecurity to embrace hybrid working.

It goes without saying that employee demands have significantly shifted since the pandemic resulting in many businesses introducing remote and hybrid working as part of their long-term working culture. For traditional businesses that are calling their employees back to full-time office work are treading on thin ice. In fact, a recent survey from Slack found that of 1,000 employees, 16 percent expressed their reason for changing job is due to full-time office work.

However, many businesses have realized the importance of providing this flexibility and consequently offer hybrid working as part of the job description to retain and attract better talent. Though working virtually does fulfill employee demands, it also puts businesses in a perilous position and vulnerable to cybercrime if not executed correctly.

Acknowledging cyber threats of 2022

The work-from-home model has led businesses to face more issues in data security and user monitoring. According to recent research from the British Chambers of Commerce, one in ten companies became victims of a cyber attack in the last year. This figure further goes to one in seven while talking about larger firms. Moreover, it is evident that work-from-home, accelerated by the pandemic, has left businesses’ IT systems more exposed to cyber-attacks.

These attacks not only prove to be harmful for the organization but also compromise the sensitive information about their stakeholders that can maximize their exposure to a cybercrime. Hence, it becomes indispensable to have appropriate cybersecurity measures in place to shield the business from criminal activity in cyberspace such as phishing and ransomware. According to Forbes, ransomware cost businesses worldwide $20 billion in 2021 and is expected to rise to $265 billion by 2031. This not only indicates the upcoming rise in cybersecurity challenges for businesses but also makes it necessary for businesses to plan their cybersecurity strategy.

Cloud adoption: the panacea for cybersecurity challenges

Cloud-based technologies such as virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) enable businesses to implement critical cybersecurity measures that are difficult to penetrate including zero trust architecture (ZTA) and shielded logins. In a post-pandemic era where remote working has become the ‘new normal’, credential thefts are rife. However, cloud-based authentication services can add an additional layer of security by making backend systems perform the majority of the authentication process.

Zero trust: must-have approach

Hackers continue to find new ways to penetrate various security systems. Insider threats continue to be a serious concern due to trusted people taking leverage of their access for their malicious purposes. Organizations should look to upgrade their outdated security systems to advanced authentication-based systems that not only verify access throughout but also monitor user activity while tracking the duration, location, and time of logins.

The ZTA (Zero Trust Architecture) platform treats every user in an equal way with no trust, and creates the same criteria for login for each individual. It provides users with an isolated environment in order to minimize the risk of spying and misuse of the data. In this platform each access, irrespective of it being external or internal, is authenticated. Users are not only checked at the time of login but their activity is continuously monitored and trust status is questioned regularly. Any risk detected during the activity interrupts the granted access to the user. The application focuses on defined corporate assets instead of individual network segments.

Implementation of ZTA can not only reduce the threat surface, a sum of different points where hackers can try to extract data of the business, but at the same time can increase the control of the authentication while maximizing visibility and user activity. The use of zero trust for access can also play a significant role in providing protection from external breaches. What’s more, organizations that implement a combination of ZTA to deliver resources from data centers will be able to complement the cybersecurity solutions employed at the data centers themselves.

Eliminate human error

It has been observed in the past that most corporate data breaches are the result of employee error. According to an IBM Cyber Security Intelligence Index Report, human error was a major contributing factor in 95 percent of the data breaches. This is where separation comes into the picture and can aid a company in avoiding risk of a data breach caused by human mistake.

Separating the hosting environment for users and businesses can play a key role in eliminating the risk of a breach caused by human error. By the virtue of cloud offerings, organizations can strengthen their bring-your-own-device (BYOD) models and each user can be allocated access to some necessary data required by the user instead of the full access to the confidential data.

By implementing this approach, not only can companies avoid any risks of a data breach but gain more control over what is exposed to the employees based on their level in the organization.

With the knowledge that more than half of 18 to 34-year-olds do not want to work full time in office, it becomes explicit that remote culture is here to stay. Businesses at this stage should avoid cutting back on investing in cybersecurity and initiate their responsible role in protecting their cyber assets amidst this increase in teleworking. With 2022

welcoming the growth of work-from-home and businesses making it a part of their perks, cloud computing is a one-stop shop solution for organizations to embrace hybrid working and deal with various security-related issues for businesses in the post-pandemic world.

Unlocking productivity and efficiency gains with data management

Russ Kennedy • 04th July 2023

Enterprise data has been closely linked with hardware for numerous years, but an exciting transformation is underway as the era of the hardware businesses is gone. With advanced data services available through the cloud, organisations can forego investing in hardware and abandon infrastructure management in favour of data management.

The Future of Cloud: A Realistic Look at What’s Ahead

Erin Lanahan • 22nd March 2023

Cloud computing has transformed the way we work, communicate, and consume technology. From storing data to running applications, the cloud has become an essential part of our lives. But what does the future hold for this technology? In this article, we’ll take a realistic look at the future of the cloud and what we can...

Ab Initio partners with BT Group to deliver big data

Luke Conrad • 24th October 2022

AI is becoming an increasingly important element of the digital transformation of many businesses. As well as introducing new opportunities, it also poses a number of challenges for IT teams and the data teams supporting them. Ab Initio has announced a partnership with BT Group to implement its big data management solutions on BT’s internal...