Why remote work security is so difficult and the single best thing you can do about it
In the era of hybrid work, businesses of every size are operating virtually more than ever before. While today’s digital revolution is cause for celebration, it has also resulted in the creation of more high-risk IT environments. Now company assets have become infinitely more accessible to threat actors, which has helped fuel the massive uptick in security attacks against these new threat vectors.
Hybrid work makes security even more of a business problem. Do nothing and it’s only a matter of time before your company becomes a hybrid work security statistic:
- 56% of remote employees are using personal (uncontrolled) devices to do their work, and 64% of companies worldwide have experienced at least one form of a cyber attack.
- When 50% of users work remotely, it takes organizations 58 days longer to identify and contain a breach. The longer it takes to contain, the more costly the breach, according to IBM.
- The average data breach costs $4.2M, and revenue losses account for 38% or $1.59M of that figure. When a remote worker was a causing factor, the breach cost the company $1.07M more.
So, if you can only do one thing, what should it be? To get to the answer, it helps to first unpack the three factors making security more challenging today.
1. Big data unleashed equals big problems
Big data contained is far less a security problem than big data unleashed. With data being accessible from virtually anywhere and all the time, IT leaders are facing tough questions, like “How do we effectively scale security in an IT environment that essentially has no boundaries?”
This problem stems from the fact that traditional networks no longer exist. Under hybrid work models, data resides wherever your endpoints and users are, and that puts assets in unmanaged locations beyond the control of the IT team. This trend is not new, however it’s been exacerbated by the pandemic. Nemertes Research summarizes this in their white paper:
Porous boundaries constitute the new corporate network
Most architects think of the corporate WAN as connecting “inside-to-inside”: that is, premises-based users (e.g. workers in offices) to premises-based resources (e.g. applications running in data centers). That’s not only inaccurate in these post-Covid days, it’s been inaccurate for a long time.
In early 2020, Nemertes research studies found that just 38% of all WAN traffic was “inside-to-inside.” The remaining 62% was either:
- “outside-to-inside” (e.g. WFH workers connecting to premises based resources),
- “inside-to-outside” (e.g. on-premise workers connecting to the cloud), or
- “outside-to-outside” (e.g. WFH workers connecting to the cloud).
We have every reason to believe that the percentage of inside-to-inside traffic has declined precipitously in 2020 and 2021, and will bounce back only slightly as some employees shift back to working in offices.
Compounding this complexity is the fact that big data will only get bigger. The sheer volume of data that is collected, stored, parsed, and analyzed is far more than any humans can possibly manage. What data is relevant? How can we automate the analysis of this data for threats? Moreover, how can the threat response be automated?
2. Zero Trust is unattainable for mobile phones and supply chains
Zero Trust is considered today’s leading security strategy; however, Zero Trust isn’t always possible in every scenario. Mobile devices and any uncontrolled hardware create obstacles that the security industry has not yet overcome. Simply put, it’s because of supply chain based attacks.
It all goes back to the device manufacturers who must defend their hardware, microchips, and software from attackers. But this defense job is nearly impossible. No security technology exists today that can effectively protect against supply chain attacks targeting the software or hardware suppliers themselves, and Zero Trust fails to evaluate the user device at the hardware and source-code level.
Zero Trust can verify user identities until the sun goes down, but those checking functions don’t go deep enough to identify the underlying threat. Thus, mobile device security will be compromised until Zero Trust reaches ground zero.
3. New technologies make attacks easier–cybercriminals are doubling down
Technology innovation cuts both ways, benefiting companies and criminals. This helps explain why cyber criminals and nation state actors are doubling down on their efforts to both profiteer from and disrupt hybrid businesses.
- New technologies like deepfakes and GPT3 can be used to automate attacks.
- With Microsoft Office 365, bad actors can evade detection with just a few clicks.
- Ransomware is increasing 148+% year over year, and cryptocurrency is making it worse.
I explain these issues in depth in this article, Cybersecurity threats now: 6 eye openers from Black Hat every IT leader should know.
Work from home security: The single best thing you can do
Nearly all cyber threats have one thing in common, and this consistency is a key advantage for those needing to reliably find that “needle in a haystack.” All threats generate observable network communications, which means the network remains the keystone to increasing your security posture.
But you cannot protect what you cannot see. Gaining complete visibility into the network is crucial for rapid threat identification and isolation, but also for managing and securing all the endpoints that come with any distributed workforce. These tips can help.
Advice for hybrid work security
- Ensure all remotely connected devices have advanced endpoint detection and response solutions and are actively monitored 24/7.
- Protect data in cloud-based environments via security access policies and monitoring technologies.
- Invest in monitoring tools that have visibility into all access points in and out of all environments.
- Deploy security orchestration, automation, and response capabilities to streamline detection and response.
- Adopt a Zero Trust security framework to prevent unauthorized access to critical data.
At the end of the day, there will always be an attack vector you don’t know about, a threat you didn’t see coming, or a black swan event — a pandemic that changes everything. Focus on what you can control. The single best thing you can do is keep an eye on your network and your assets. This act alone will help improve your security posture, little by little with each adjustment you make.
Need help with your work-from-home security strategy? Get a free consultation from Masergy.
Interested in how SD-WAN can improve your business?
Call us now to arrange a consultation (866) 588-5885.
Or arrange for a consultation through our request form.
Hybrid work without the headaches: 7 technologies you need now
With hybrid work the new permanent, simplifying the necessary tech stack is key. The real secret—consolidating tools for less IT complexity.
How IT Automation Can Be Your Next Business Discipline
Knowledge and proficiency always come with practice, and the same holds true for artificial intelligence and machine learning.
Security point solutions are useless in 2022 and beyond
Masergy’s final prediction for 2022 is one of the most important. Here are our tips for breaking down silos and taking a holistic approach to security.
Why Masergy is the innovation leader in new Frost Radar™ report evaluating SD-WAN services
Frost & Sullivan positioned Masergy as the most innovative managed SD-WAN service in the industry. Here are five reasons why.
Convergence and co-creation trends will give birth to open ecosystems
In our third prediction for 2022, Masergy foresees wider IT convergence, more collaboration, and more interconnected IT ecosystems.
Predictions: 2022 will be the year to modernize IT or die
Continuing our predictions for 2022, Masergy explores why the IT infrastructure has become a high stakes essential powering remote and hybrid work.
AIOps goes mainstream, empowering hyper automation and accelerated innovation
In this series of articles Masergy outlines its predictions for 2022, starting with AIOps and how it will hyper automate IT operations.
What the analysts say about selecting a managed security services provider
Only the largest businesses can handle security 100% internally, but finding an MSSP can be hard. These tips come from Nemertes Research.
Masergy’s Jim Glackin receives 2021 Channel Partners Circle of Excellence award
Circle of Excellence honors Masergy for vision, innovation, and advocacy of the channel during a time of transition and convergence.
Why you need an AIOps strategy today
65% of IT teams are already using AI, and learning from them is the best way to shape your strategy. Join us as we unpack the latest AIOps research.
Artificial Intelligence Key to Business Continuity and Security Finds New Masergy State of AIOps Study
Businesses are embracing AI to make IT operations smarter, faster, and more secure, according to a new ZK Research study.
5 reasons to be excited about the Comcast Business acquisition
Here’s how our combined company will accelerate digital transformation and unlock more value for clients, partners, and the industry at large.
Not getting the collaboration experience you want? Look at your technology provider
Collaboration applications won’t perform without the right support systems. In fact, it’s what’s behind the technology curtain that matters most.
Resourcive, CXT180, and Subsidium Technologies attain Apex level status in Masergy Zenith Program
Congratulations to our partners Resourcive, CXT180 and Subsidium Technologies for attaining Apex level status in the Masergy Zenith Program!
Network segmentation security: How to avoid IT complexity
How can you partition networks to avoid complexity? Here’s how Masergy advises IT leaders when it comes to segmenting networks for security purposes.
Embracing what’s next
With every new technology shift comes the promise of what’s possible along with uncertainty inherent in change.
What is Zero Trust security and how do I get started?
Security strategies from the past 20 years are no longer working. Zero Trust offers a more resilient security approach for today’s challenges.
Cybersecurity threats now: 6 eye openers from Black Hat every IT leader should know
Takeaways from Black Hat reveal what IT professionals should know as they strengthen security postures and counteract cyber criminals.
Comcast Business to Acquire Masergy, a Pioneer in Software‑Defined Networking and Cloud Platforms
The acquisition accelerates Comcast Business’s increasing growth serving large and mid-size companies with multi-site global operations.
4-Step cybersecurity risk assessment
Data breaches cost $4.24M on average. Use the following four steps to help identify where you are today and what you should do next to improve your security posture.
Setting a course for SASE: Best practices and questions to address along the way
Here we explore the SASE plans companies are making and the difficult questions they address along the way.
Masergy Helps Keep Azzurro HD at Forefront of At-Home TV Broadcast
For more than 10 years, media services company Azzurro HD has relied on Masergy to help create high-performance, broadcast-quality TV studios anywhere.
The Top Five Cybersecurity Threats to Watch Out for Now
Online security threats are constantly evolving. What should you worry about now? Here’s the latest line up of cybersecurity threats and how to stay ahead.
Masergy Announces Zenith Partner of the Year Awards
Following the company's best year ever, Masergy celebrates channel partners for their 2021 sales achievements.
Remote work, cloud security, and SASE: Putting CASB to work in the real world
CASB is essential in a world where the cloud and remote work dominate. Here we examine use cases for it and how it fits into the SASE model.
Accelerating Autonomous Networking: How SASE Improves AIOps
The pairing of two technologies — SASE and AIOps — accelerates innovation, creating a new breakthrough for autonomous networking.
Masergy’s Florence Le Goff Honored in the 2021 CRN® 2021 Rising Female Stars List
Masergy’s Director of Channel Marketing recognized for contributions shaping the future of the IT channel.
Getting SASE? Four guidelines for success
To ensure security and agility and reap the full benefits of SASE, you need to follow four key guidelines for success.
Why legal firms choose Masergy to digitize and improve the client experience
Here’s how Masergy helped several global law firms modernize to meet the needs of their clients while prioritizing data security.
Masergy Wins Two 2021 Visionary Spotlight Awards
Masergy Zenith Partner Program and Masergy AIOps Recognized for Excellence
Why manufacturers are moving to AI and IoT with Masergy
Here’s why three manufacturers moved to smart manufacturing using Masergy’s cloud network platform and managed services.
Masergy Wins Globee® in the 16th Annual 2021 IT World Awards®
Masergy Work From Anywhere solutions recognized for providing IT leaders with one cloud platform to cover the needs of their remote workforces.
SASE misconceptions: How to take a pragmatic approach to network & security convergence
Misconceptions abound when it comes to turning SASE into a pragmatic plan. It’s easy to take SASE principles too far. Here’s a practical approach.
Masergy aligns its services for the future of ITMasergy aligns its services for the future of IT
eWeek interviews Masergy's CEO to understand how the network is evolving as a key player in today's fast-paced digital transformation.
Masergy Releases 2021 State of SD‑WAN Study
SD-WAN gains traction with preferences for reliable, secure, and hybrid-access SD-WAN revealing how IT leaders find an ROI sweet spot.
Hybrid work calls for SD-WAN with hybrid access
SD-WAN helps address the challenges of remote work, and 58% of IT decision makers expect to use hybrid access. Here’s why.
Datatel1 and Digital Planet Communications Inc. reach Apex level in Masergy Zenith Program
Congratulations to our partners Datatel1 and Digital Planet Communications Inc. for attaining Apex level status in the Masergy Zenith Program!
The top 8 CASB use cases and how to ensure you’re covered
Cloud Access Security Brokers (CASBs) are go-to solutions for securing corporate data and cloud-based apps on employee devices. Learn why CASB is a crucial component of Gartner’s Secure Access Service Edge (SASE) framework and the top use cases for using CASB at your business.
Want to make remote team collaboration easy? Combine UCaaS with SASE
Build your remote workforce by integrating UCaaS with SASE solutions that back collaboration applications with performance and security.
EDR: The single best protection against ransomware
Advanced Endpoint Detection and Response (EDR) is the best medicine for ransomware. Here’s what to look for, and how companies use it.
IT may be killing your M&A strategy: Using SASE and SD-WAN to accelerate integration
Need to unite two companies quickly without jeopardizing security? Here’s how to put SASE and SD-WAN to work for your M&A strategy.
How I built it: Using AIOps to automate IT operations and WFH solutions
CIO Joe Gracz explains how he AIOps and IT automation to accelerate his manufacturing company’s work-from-home solution.
Masergy Enhances AIOps to Help Companies Improve Cloud Application Performance
With AI and machine learning applied to cloud applications, IT teams can automate management, predict performance, and ensure availability
AI for cloud apps: Masergy’s new AIOps is like a digital fortune teller optimizing your video conferencing
Managing cloud applications just got a lot easier thanks to Masergy’s latest AIOps innovations which can predict and prevent application outages.
Masergy Zenith Program welcomes Blue Equinox, DVP Technologies and RealCom Solutions as Apex members
Congratulations to our partners Blue Equinox, DVP Technologies and RealCom Solutions for attaining Apex level status in the Masergy Zenith Program!
Masergy Awarded 2021 INTERNET TELEPHONY SD‑WAN Product of the Year Award
Masergy recognized as demonstrating the innovation, vision, and execution needed to drive the upward market trajectory of SD-WAN
Masergy Wins Fortinet’s MSSP Partner of the Year Award
The MSSP Partner of the Year award is presented to partners who demonstrate innovation, growth, and alignment with Fortinet. Here’s why Masergy won.
SDx Networks partners with Masergy to deliver cloud networking in Australia, New Zealand, AsiaPac
Expanding Masergy’s reach, SDx Networks is Masergy’s newest channel partner in the land down under. Here’s why they chose Masergy.
Our best year in Masergy’s history
Businesses of all sizes are flocking to Masergy’s cloud networking platform. Here’s a look at our sales and why more IT leaders prefer our solutions.
Masergy Zenith Program helps partners reach companies of all sizes with flexible SASE solutions
The Zenith Program is six months old, which makes now a great time to check in on our progress and what’s coming next for the channel.
5X Visionary: Gartner positions Masergy as a Visionary in 2021 Magic Quadrant for Network Services, Global
The 2021 Gartner Magic Quadrant for Network Services, Global is here!
Masergy Named as a Visionary in 2021 Gartner Magic Quadrant for Network Services, Global for Fifth Consecutive Year
Masergy has been named a Visionary in Gartner, Inc.’s March 2021 Magic Quadrant for Network Services, Global, for the fifth consecutive year
WFH security do’s and don’ts: Reducing risk for a network without borders
As WFH companies perform much-needed security audits today, here are the biggest concerns they face and a list of do’s and don’ts for addressing them.
Cisco Webex + Masergy SD-WAN: The collaboration combo businesses need in 2021
Keep things simple with integrated services. Masergy UCaaS with Cisco Webex offers SD-WAN service for a perfectly complete collaboration solution.
CRN Names Masergy to its 2021 MSP 500 List
Masergy recognized by CRN as innovative and forward-thinking managed service provider.
Secure Web Gateway: How it serves the hybrid workforce and SASE too
SWG melds into broader offerings today, better serving the needs of the anywhere business. As markets converge, here’s what buyers should consider.
Debunking SD-WAN Myths
Many people believe it’s only SD-WAN if your network uses public internet links, but that’s false. Here’s why SD-WAN should be access agnostic.
Jim Glackin of Masergy Recognized as 2021 CRN® Channel Chief
Prestigious CRN Channel Chiefs list recognizes Masergy’s SVP of Global Channels for outstanding leadership, influence, innovation, and growth
Masergy launches Managed Endpoint Detection & Response: Technology, analytics, and analysts in one turnkey solution
With technology, analytics, and security analysts all in one solution, clients can efficiently widen their security coverage to every endpoint.
Masergy Awarded 2021 TMCnet Remote Work Pioneer Award
Masergy's Work From Anywhere solutions were honored by TMCnet for innovation and performance excellence
SASE, the appeal of cloud firewalls, and when on-prem still matters
Explore the advantages of cloud firewalls, the role FWaaS plays in SASE solutions, and when to opt for the cloud or stick with on-premise.
IDG healthcare IT study: Convergence of network and security technologies enable efficient operations and orchestration
Explore new IDG research, discovering the latest security trends in healthcare and the approaches used to solve the problems of digital care.
Professional Services: Planning your move to digital, remote work with UCaaS + SD-WAN
Law firms and other service firms are streamlining digital transformation by addressing UC, the network, and security in one unified strategy.
Masergy and Fortinet Release IDG Healthcare IT Survey Results
The study surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities
The 2021 enterprise network: Retiring the branch, fueling transformation and getting more from AI
With 2020 one of the biggest years the enterprise network has had, here's a look back at how key impacts will shape the evolution of the network in 2021.