Blog

5 minutes

How to liberate hybrid workers while locking down the business

How to liberate hybrid workers while locking down the business

One of the many consequences of pandemic lockdowns that forced people to work from home was a spike in cyber threats, specifically phishing attacks that targeted employees who might be more susceptible to email scams when away from the office. Now that most companies are looking at  a hybrid combination of home and office working, it’s incumbent on businesses to mitigate those risks and others.

The paradox in liberating employees to work from anywhere is that the business must be rigorous in locking down the technologies that enable them to do it. Some steps for achieving this are more straightforward than others, like moving to the cloud. Providing remote access from the cloud is much simpler and more cost-effective than doing it from an office. Most organizations will have some hosted applications at this stage, typically Microsoft 365.

Cloud platforms provide a more integrated approach to security and do away with legacy VPN networks and clunky sign-in processes. Subscribe to Microsoft 365, as many organizations now do, and there’s no need for a VPN. Encryption and security are built-in with multi-factor authentication, enabling people to work securely from anywhere – from their homes, at the café or the airport.

Moving workloads to the cloud also relieve the IT department of refresh cycles and patching processes that ensure apps and services are always up to date and secure. It’s a good first step but there is still plenty of work to do.

Never trust, always verify

Every organization should put a security framework in place and adopt a zero-trust approach. The ‘never trust, always verify’ mantra is a guiding principle to follow as you navigate the complexity of hybrid working, which breaks down the traditional office perimeter. The need to have controls to protect employees, devices, applications, and data becomes more challenging,

Authentication and authorization controls are the foundation for making hybrid working secure. Authentication is about ensuring the person logging into your systems is who they say they are. Abnormal behavior can be an early indicator for a stolen ID – someone seeking access at a time that wouldn’t be typical of them, for example, or via a device that’s not familiar. It is a level of trust based on context.

Once you’ve identified the person and you trust they are who they say they are, it’s about authorizing access to the apps and services they need to do their jobs. This relates to personae profiling – explored in other blogs in the ‘Let’s Make Hybrid Work’ campaign. It’s an example of why Ergo favors a holistic approach to hybrid working, with six interconnected components that help achieve the right balance between liberation and locking down.

Best forms of defense

The good news is that wide-ranging tools are available to layer security across an organization’s infrastructure and lock it down; however, these tools are distributed among the workforce. Access and identity management tools are crucial, particularly for people working remotely, ensuring you can verify who is logging into systems and apps. Moving to a pass wordless environment is the best way forward; personalized virtual smart cards are another way to go. Multi-factor authentication should be enabled for all critical systems.

To aggregate and analyze activity across the security layers that encompass everything from the hybrid worker’s device to the cloud, you need a SIEM (Security Information and Event Management) solution, a single data source for detecting threats and triggering a response to an attack or a breach. Typically coupled with an MDR (Managed Detection and Response), a 24/7 managed security service, it gives organizations end-to-end coverage, from detection to investigation, containment and response.

At Ergo, we recommend Azure Sentinel as a SIEM and tap into Microsoft’s security resources. Microsoft has invested $20 billion in cloud security over a five-year period, and processes 24 trillion security signals every 24 hours from endpoints, products, services, and feeds from around the globe. More data means better intelligence, arguably the most important weapon in the war against ransomware, supply chain attacks like SolarWinds, and other emerging cyber threats.

What to do after a breach

The hard fact of life for every business is that there’s a good chance you have already been breached, and if you haven’t, you are more likely to be when you move to a hybrid working model – zero trust principles assume the worst. As SolarWinds demonstrated, a new kind of threat can undo all the benefits of cloud-based infrastructure and layered security. This is why threat remediation is so necessary.

Integral to security management is having the tools to detect a virus in your systems and mitigate spreading and infecting other parts of the business. Being able to remediate an attack as quickly as possible is vital, which includes identifying and fixing the vulnerability that allowed it to happen in the first place.

Businesses also need to think about wrapping the most robust defenses around their most valuable assets. A risk management assessment will reveal what they are. It could be personal information in customer-facing organizations, like banks, where there are strict regulatory requirements around data management. In a pharmaceutical company, intellectual property may be the crown jewels that need the most protection.

People still the weakest link

Policies and procedures, shared with and signed off by employees, will be a big part of the security framework. People remain the weakest link because it’s hard to protect against them clicking the wrong link or revealing too much about their jobs on social media, unwittingly attracting the attention a hacker.

Phishing scams are part of an endless stream of social engineering scams designed to make us slip up. More and continuous training is needed, particularly as home working has exposed people to more risk. Device management is key, whether it’s through desktop virtualization or issuing employees with company laptops laden with endpoint security. But human error will never be eliminated, which is why breach remediation is so important.

A tried-and-tested DR (Disaster Recovery) plan is also imperative, particularly if the worst consequences play out. This takes us back to where we started, and how the cloud has changed the landscape, not just for business-as-usual activity but also for business continuity plans. Mirrored virtual infrastructure enables faster recovery time objectives with a lot less investment and complexity.

The number of zero-day attacks, where new vulnerabilities come to light, reached an all-time high in 2021, and there’s little reason to expect this year will be any better. The sheer volume and sophistication of threats means that the best-practice security outlined above may not be enough to prevent or fully contain a breach,  but implementing a thorough security framework is still the very least organizations should do.

 

Related Blogs

                            Array
(
    [ID] => 88134
    [id] => 88134
    [title] => image (4) (1)
    [filename] => image-4-1.png
    [filesize] => 421568
    [url] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1.png
    [link] => https://ergotechnologygroup.com/us/insights/blog-us/key-takeaways-from-fabcon-europe-2024/attachment/image-4-1-2/
    [alt] => Key Takeaways from FabCon Europe 2024 
    [author] => 18
    [description] => 
    [caption] => 
    [name] => image-4-1-2
    [status] => inherit
    [uploaded_to] => 88613
    [date] => 2024-10-14 16:19:45
    [modified] => 2024-10-23 08:38:54
    [menu_order] => 0
    [mime_type] => image/png
    [type] => image
    [subtype] => png
    [icon] => https://ergotechnologygroup.com/wp-includes/images/media/default.png
    [width] => 748
    [height] => 488
    [sizes] => Array
        (
            [thumbnail] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1-150x150.png
            [thumbnail-width] => 150
            [thumbnail-height] => 150
            [medium] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1-300x196.png
            [medium-width] => 300
            [medium-height] => 196
            [medium_large] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1.png
            [medium_large-width] => 748
            [medium_large-height] => 488
            [large] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1.png
            [large-width] => 748
            [large-height] => 488
            [1536x1536] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1.png
            [1536x1536-width] => 748
            [1536x1536-height] => 488
            [2048x2048] => https://ergotechnologygroup.com/wp-content/uploads/2024/10/image-4-1.png
            [2048x2048-width] => 748
            [2048x2048-height] => 488
        )

)
1
                            
Key Takeaways from FabCon Europe 2024

Blog

Key Takeaways from FabCon Europe 2024

                            Array
(
    [ID] => 54202
    [id] => 54202
    [title] => Dairygold
    [filename] => Dairygold.png
    [filesize] => 849769
    [url] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold.png
    [link] => https://ergotechnologygroup.com/us/events/app-in-a-day/attachment/dairygold-2/
    [alt] => 
    [author] => 18
    [description] => 
    [caption] => 
    [name] => dairygold-2
    [status] => inherit
    [uploaded_to] => 55580
    [date] => 2024-01-19 18:52:10
    [modified] => 2024-01-19 18:52:10
    [menu_order] => 0
    [mime_type] => image/png
    [type] => image
    [subtype] => png
    [icon] => https://ergotechnologygroup.com/wp-includes/images/media/default.png
    [width] => 1500
    [height] => 867
    [sizes] => Array
        (
            [thumbnail] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-150x150.png
            [thumbnail-width] => 150
            [thumbnail-height] => 150
            [medium] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-300x173.png
            [medium-width] => 300
            [medium-height] => 173
            [medium_large] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-768x444.png
            [medium_large-width] => 768
            [medium_large-height] => 444
            [large] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-1024x592.png
            [large-width] => 1024
            [large-height] => 592
            [1536x1536] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold.png
            [1536x1536-width] => 1500
            [1536x1536-height] => 867
            [2048x2048] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold.png
            [2048x2048-width] => 1500
            [2048x2048-height] => 867
        )

)
1
                            

Blog

3 Ways Your Legacy IT Infrastructure May Undermine Innovation

                            Array
(
    [ID] => 54202
    [id] => 54202
    [title] => Dairygold
    [filename] => Dairygold.png
    [filesize] => 849769
    [url] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold.png
    [link] => https://ergotechnologygroup.com/us/events/app-in-a-day/attachment/dairygold-2/
    [alt] => 
    [author] => 18
    [description] => 
    [caption] => 
    [name] => dairygold-2
    [status] => inherit
    [uploaded_to] => 55580
    [date] => 2024-01-19 18:52:10
    [modified] => 2024-01-19 18:52:10
    [menu_order] => 0
    [mime_type] => image/png
    [type] => image
    [subtype] => png
    [icon] => https://ergotechnologygroup.com/wp-includes/images/media/default.png
    [width] => 1500
    [height] => 867
    [sizes] => Array
        (
            [thumbnail] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-150x150.png
            [thumbnail-width] => 150
            [thumbnail-height] => 150
            [medium] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-300x173.png
            [medium-width] => 300
            [medium-height] => 173
            [medium_large] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-768x444.png
            [medium_large-width] => 768
            [medium_large-height] => 444
            [large] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold-1024x592.png
            [large-width] => 1024
            [large-height] => 592
            [1536x1536] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold.png
            [1536x1536-width] => 1500
            [1536x1536-height] => 867
            [2048x2048] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Dairygold.png
            [2048x2048-width] => 1500
            [2048x2048-height] => 867
        )

)
1
                            

Blog

Unlocking Environmental Sustainability and Cost Savings with Virtual Desktop Infrastructure

                            Array
(
    [ID] => 47139
    [id] => 47139
    [title] => viktor-kiryanov-994111
    [filename] => viktor-kiryanov-994111.jpg
    [filesize] => 103409
    [url] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111.jpg
    [link] => https://ergotechnologygroup.com/us/insights/news/ergo-joins-global-elite-of-microsoft-partners-with-azure-expert-msp-status/attachment/viktor-kiryanov-994111-2/
    [alt] => 
    [author] => 13
    [description] => 
    [caption] => 
    [name] => viktor-kiryanov-994111-2
    [status] => inherit
    [uploaded_to] => 55472
    [date] => 2023-12-11 16:46:17
    [modified] => 2023-12-11 16:46:17
    [menu_order] => 0
    [mime_type] => image/jpeg
    [type] => image
    [subtype] => jpeg
    [icon] => https://ergotechnologygroup.com/wp-includes/images/media/default.png
    [width] => 1500
    [height] => 859
    [sizes] => Array
        (
            [thumbnail] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111-150x150.jpg
            [thumbnail-width] => 150
            [thumbnail-height] => 150
            [medium] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111-300x172.jpg
            [medium-width] => 300
            [medium-height] => 172
            [medium_large] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111-768x440.jpg
            [medium_large-width] => 768
            [medium_large-height] => 440
            [large] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111-1024x586.jpg
            [large-width] => 1024
            [large-height] => 586
            [1536x1536] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111.jpg
            [1536x1536-width] => 1500
            [1536x1536-height] => 859
            [2048x2048] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/viktor-kiryanov-994111.jpg
            [2048x2048-width] => 1500
            [2048x2048-height] => 859
        )

)
1
                            

Blog

Reset network management and security withSASE

                            Array
(
    [ID] => 54067
    [id] => 54067
    [title] => Frame 2
    [filename] => Frame-2-2.png
    [filesize] => 256373
    [url] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2.png
    [link] => https://ergotechnologygroup.com/us/insights/blog-us/ergo-and-vmware-help-financial-services-companies-towards-dora-compliance/attachment/frame-2-3/
    [alt] => 
    [author] => 18
    [description] => 
    [caption] => 
    [name] => frame-2-3
    [status] => inherit
    [uploaded_to] => 55425
    [date] => 2024-01-19 12:21:18
    [modified] => 2024-01-19 12:21:18
    [menu_order] => 0
    [mime_type] => image/png
    [type] => image
    [subtype] => png
    [icon] => https://ergotechnologygroup.com/wp-includes/images/media/default.png
    [width] => 1345
    [height] => 664
    [sizes] => Array
        (
            [thumbnail] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2-150x150.png
            [thumbnail-width] => 150
            [thumbnail-height] => 150
            [medium] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2-300x148.png
            [medium-width] => 300
            [medium-height] => 148
            [medium_large] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2-768x379.png
            [medium_large-width] => 768
            [medium_large-height] => 379
            [large] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2-1024x506.png
            [large-width] => 1024
            [large-height] => 506
            [1536x1536] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2.png
            [1536x1536-width] => 1345
            [1536x1536-height] => 664
            [2048x2048] => https://ergotechnologygroup.com/wp-content/uploads/2024/01/Frame-2-2.png
            [2048x2048-width] => 1345
            [2048x2048-height] => 664
        )

)
1
                            

Blog

Ergo and VMware help financial services companies towards DORA compliance

                            Array
(
    [ID] => 46598
    [id] => 46598
    [title] => Teams_Conferences_Banner
    [filename] => Teams_Conferences_Banner.png
    [filesize] => 446911
    [url] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner.png
    [link] => https://ergotechnologygroup.com/us/insights/blog-us/making-microsoft-teams-conferences-a-better-experience-for-all/attachment/teams_conferences_banner-2/
    [alt] => 
    [author] => 8
    [description] => 
    [caption] => 
    [name] => teams_conferences_banner-2
    [status] => inherit
    [uploaded_to] => 55426
    [date] => 2023-12-07 22:54:23
    [modified] => 2023-12-07 22:54:23
    [menu_order] => 0
    [mime_type] => image/png
    [type] => image
    [subtype] => png
    [icon] => https://ergotechnologygroup.com/wp-includes/images/media/default.png
    [width] => 1480
    [height] => 492
    [sizes] => Array
        (
            [thumbnail] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner-150x150.png
            [thumbnail-width] => 150
            [thumbnail-height] => 150
            [medium] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner-300x100.png
            [medium-width] => 300
            [medium-height] => 100
            [medium_large] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner-768x255.png
            [medium_large-width] => 768
            [medium_large-height] => 255
            [large] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner-1024x340.png
            [large-width] => 1024
            [large-height] => 340
            [1536x1536] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner.png
            [1536x1536-width] => 1480
            [1536x1536-height] => 492
            [2048x2048] => https://ergotechnologygroup.com/wp-content/uploads/2023/12/Teams_Conferences_Banner.png
            [2048x2048-width] => 1480
            [2048x2048-height] => 492
        )

)
1
                            

Blog

Making Microsoft Teams conferences a better experience for all