Trying to protect remote workers has never been so complex or fraught with risk.<\/p>\n
Working from home, hybrid working, SaaS, cloud migration, secure remote access, ransomware<\/a>, phishing attacks, social engineering, credential theft, BYOD \u2013 the list goes on and on.<\/p>\n
But the old methods of protecting remote workers are no longer fit for purpose.<\/p>\n
1. Don\u2019t <\/span>ignore<\/span> unmanaged devices<\/span><\/p>\n
2. Fail to plan, plan to fail<\/span><\/p>\n
Malicious actors are becoming more sophisticated and adaptive in their methods.<\/p>\n
What works today will not necessarily work tomorrow.<\/p>\n
Today\u2019s\u00a0Highly Evasive Adaptive Threats (HEAT)\u00a0target web browsers and employ techniques to evade multiple layers of detection in current security stacks, including firewalls, sandbox analysis, and phishing detection.<\/p>\n
HEAT attacks can be used as the initial access point to deliver malware or to compromise credentials, which in many cases leads to ransomware and other attacks.<\/p>\n
Knowledge is power when trying to protect remote workers, and even more so when it comes to emerging threats like HEAT attacks.<\/p>\n
3. Relying on VPNs<\/span><\/p>\n
VPN appliances are not scalable enough to meet the needs of digital, agile organisations where users need to access applications quickly and reliably wherever they are.<\/p>\n
Once credentials are compromised through social engineering, fake login forms, or phishing, threat actors have unrestricted access to the network with little to no east-west security controls in place.<\/p>\n
Even when they do work, VPNs sap bandwidth and increase latency by backhauling Internet traffic to a secure data centre.<\/p>\n
Organisations should look at alternative methods of secure remote access, such as cloud-based application isolation, providing connections to applications with a layer of threat prevention.<\/p>\n
This offers enhanced Zero Trust access and maximises security posture without impacting the end user experience.<\/p>\n
4. Over-consolidating security solutions<\/span><\/p>\n
According to\u00a0Anomali<\/a>, organisations rely on an average of 50 to 80 security tools, which rises to 120 for large companies. This software sprawl can lead to higher capital and operating costs while causing integration and visibility issues.<\/p>\n
In 2022,\u00a0Gartner<\/a>\u00a0reported that 75% of global organisations plan to consolidate their security vendors over the next 12 months. But too much consolidation can result in a degradation of effectiveness.<\/p>\n
5. Reliance on detect and respond<\/span><\/p>\n
East-west security is critical, but it should not come at the expense of protection.<\/p>\n