Apogee & Toshiba volunteers clear an area for orchids at Holme Farm
Team Apogee lends a hand at Holme Farm!
3 July 2023
Staffordshire Uni Racing Car Apogee sponsor at Formula Student event
The Staffordshire University Racing team secures second place at Silverstone!
31 July 2023
Apogee & Toshiba volunteers clear an area for orchids at Holme Farm
Team Apogee lends a hand at Holme Farm!
3 July 2023
Staffordshire Uni Racing Car Apogee sponsor at Formula Student event
The Staffordshire University Racing team secures second place at Silverstone!
31 July 2023

Endpoint security isn’t enough to protect your hybrid workers from cybercrime

Now a central priority for many modern employees, hybrid working will play an active role in shaping the future of work. But what does this mean for cyber security?

 

When equipped with the right tools, the hybrid workforce are proving themselves to be effective from further and further afield - but while this might be great news for employees; it means a rapidly growing challenge for business leaders.  

Whether employers like it or not, the rising prominence of IoT devices mean that many are becoming entangled with their employees’ hybrid working setups – resulting in an enormous amount of entry points for CIOs to keep track of and secure.

But securing physical endpoints is only the beginning. Just as technology is becoming more refined with time, so too are cyber-threats – and if business leaders are to keep themselves safe, they must take a more holistic view of their defences; one that goes beyond endpoint security and incorporates multiple layers of protection. But what form will this take, and are organisations ready to make it a reality?

 
 
Not leaving yourself vulnerable

Pre-2020, endpoint security wasn’t necessarily a priority even among the most security-conscious businesses. This is because endpoints were nearly universally kept onsite – so as long as server locations were properly protected, endpoints were too.

However, nowadays, company endpoints are no longer all kept onsite. Instead, an interconnected web of mobiles, desktops, laptops, printers, servers, and IoT devices are now dispersed over many areas and environments; being used in homes, cafés, and even on trains.

But while company data can be accessed by each of these devices, corporate IT teams can’t always keep them all accounted for – meaning they can’t be properly protected. This is further compounded by the fact that these devices are only growing in number and many are designed only for basic antivirus (AV) and next-generation antivirus (NGAV), rather than the multiple layers of security required to repel modern cyber-threats.

With so many new points of entry, hackers are spoilt for choice when it comes to ransomware and phishing targets; with the latter comprising 41% of all security incidents. Worse still, by infiltrating devices with outdated security, hackers are now able to infiltrate company VPNs – giving them access to data across entire corporate networks, meaning enormous potential damage to any business handling sensitive information. 

 
 
Antivirus software can’t protect against everything


While the cyber security landscape has advanced by incredible leaps since antivirus software was introduced in the 1980s; worryingly, many SMBs still believe that basic antivirus is enough protection for their physical endpoints. And with so many unprotected devices, networks, and Cloud-based services currently active these days, this is not a business trend that can continue to exist in our increasingly hybrid world.

The main problem with antivirus software is that it follows a signature-based model of detection. This means that it’s only suited for recognising and blocking threats that are already known – and with so many new and sophisticated forms of malware being developed every day, the limitations of this go without saying. This is especially true these days, where sneaking malicious links past antivirus programs is easily done by embedding them within PDF attachments – which saw particular prominence near the end of 2022, with attacks of this kind skyrocketing by 38%.

But to make matters worse, the protection that antivirus provides is only as effective as its latest update – which is difficult to keep up-to-date across the board, depending on how many devices are connected to your network and how much IT resource you have access to.

Regardless, it’s clear that when it comes to cyber security, antivirus software is not enough – especially when 77% of cyberattacks arrive via email, and up to 95% of successful breaches are happening due to human error. With new cyberattacks becoming too varied and sophisticated for employees to continually be vigilant against, organisations must not rely solely on the reactive protection of antivirus, but instead embrace more proactive measures.

 
 
Isolation technology – the vital component for hybrid security

Of course, this is not to say that antivirus software is completely obsolete – but rather, it should be viewed only as a component of a multi-layered cyber security strategy, rather than one catch-all solution. In fact, favouring a versatile approach will become vital to protect the remote workforce in coming years; especially as employee demands for flexibility will necessitate investment into a wider range of digital collaboration tools.

But what does this next layer of cyber security look like?

Unlike the traditional ‘detect and block’ model, isolation technology is actually able to protect against threats that it hasn’t encountered before. This is because the technology treats all applications – PDF, Microsoft Outlook, Google Chrome, etc. – with the same zero-trust protocol, opening them into areas completely isolated from a machine’s OS. Therefore, even in the event of surprise malware, the isolation technology has already neutralised the threat and prevented it from spreading to other endpoints connected to the network.

With antivirus and endpoint security working as a foundation, isolation technology gives organisations the best chance of protecting their hybrid workforce – with protocols that even mitigate against human error to a certain extent.

But just as with any tool, isolation technology can only do so much. Clear guidelines must still be set regarding usage of personal equipment, and ensuring only certain workplace devices have secure access to corporate data. Keeping this principle in mind is crucial to constructing a truly proactive cyber security frontline; not just focusing on quick fixes, but staying mindful about the cyber security landscape and new threats originating from within the hybrid workforce.

 
 
Promoting a culture of vigilance

As with any companywide change, nurturing a culture that values cyber security is instrumental to your updated practices persisting into the future.  But even if employees are based outside of the office, a strong cyber security framework can still be integrated by updating your company policies and governance practices; and by expanding risk management processes to include incident response plans and regular penetration testing.

Another step is training and education – and for demonstrating the role that your employees play in keeping their workplace secure, you should find initiatives that favour powerful visual presentation. For many people, words on a page only go so far – whereas a demonstration from an ethical hacker could foster far-reaching behavioural change among your employees.

But before any concrete changes are made, undertaking a cyber-health check or a gap assessment is absolutely crucial. A managed service provider can ease this process, and secure you for the future – since, as well as identifying vulnerabilities in your existing security, we can also develop a solution to support your ongoing protection as the hybrid workforce continues to evolve.

In the modern cyber security landscape, businesses can no longer afford to protect their hybrid workers with only the bare minimum. However, augmenting your existing security with isolation technology – as well as cultivating a proactive culture – will allow you to put your best foot forward, and keep your employees working smarter and safer for whatever challenges the future may hold.

For more information, contact us using the form below.

 

Latest insights

3 June 2024

The Benefits of Leasing Technology for the Education Sector

With rapidly rising inflation exacerbating already-existing challenges for the education sector, leasing technology currently appears to be the most cost-effective route.
7 May 2024

Are you prepared for a Data Disaster Scenario?

When it comes to business continuity and disaster recovery planning, data management is an area that is commonly overlooked. What we mean by this is: what happens to your data in a disaster scenario?

Keep up to date with all the latest in Managed Print Services.