Cerca
Close this search box.
Cerca
Close this search box.

Agile working and attacks: all the threats to the Everywhere Workplace

What security risks are associated with agile working? How can IT teams protect agile working from attacks? And what is the modern approach to security to take?

Agile working is a necessity for companies: employees must be able to access apps and company data from any device, anywhere, anytime.

In recent months we have witnessed a race to set up the most remote workstations, to ensure the continuity of operations of all employees. What appeared to be an emergency way of working actually has many advantages and several companies are choosing to continue on this path.

New Normal, however, has its counterpart, the New Cyber Normal: the more the number of remotely connected devices grows, the more the number of cyber attacks increases exponentially.

According to the Clusit Report 2021 on ICT security in Italy, they have increased by 12 per cent and not a day goes by without newspapers reporting news of companies that have fallen victim to malware, ransomware or other cyber-attacks.

Because any company could end up in the crosshairs

From our observatory, we have identified the causes for which attacks threaten agile working:

  • the disappearance of the perimeter

With employees working remotely, the attack surface has widened. Many more backdoors - i.e. ports of entry - to protect: hackers have realised that the weakest point in the chain are employee's personal devices.

Unable to equip all employees with properly configured and protected company laptops, BYOD (Bring You Own Device) have taken over the corporate infrastructure. It is one thing to defend a defined corporate perimeter, it is quite another to defend an extended perimeter consisting of different tools and information systems.

The traditional approach to ICT security that focuses on protecting the corporate perimeter is outdated. 82 per cent of CISOs surveyed by the EMEA CISO survey agree that agile working has accelerated the disappearance of the traditional perimeter they used to defend.

  • a password is not enough

The vast majority of companies configure remote access to company data with a password: all the user has to do is identify himself. But this is far too fragile a barrier to the entry of threats that, once circumvented, leaves the field open to hackers.

According to a report by Verizon, 81 per cent of breaches occur due to weak or compromised passwords. Huge files with billions of stolen usernames, e-mail addresses and passwords can easily be found on the dark web (see the RockYou2021 collection).

No one is safe, plus if users use unsecured wi-fi networks (cafes, squares, airports, etc.) or access data from unauthorised apps, they make life much easier for hackers. Then the damage spreads like wildfire, because users are used to using the same password on multiple websites and apps.

4 out of 5 of the CISOs surveyed stated that passwords are no longer an effective means of protection.

  • there is little awareness of threats

The third cause is attributable to the human factor.

However much security technologies and strategies are increasingly being adopted, human behaviour is fallible. Superficiality, lack of knowledge, approximation characterise security management. Especially with regard to BYOD, where updates and threat protection are the responsibility of the user.

We have already mentioned that the vast majority of attacks nowadays are not hacking attacks, but exploit vulnerabilities in the human factor. Passwords come under this heading, but there are many other attacks that target user habits. We are talking about phising and social engineering.

See e-mails that appear to come from trusted sources but are actually a way of obtaining personal or corporate data. Or attachments that once opened infect computers with malware (malicious software) or open links to infected sites. By the term social engineering, we refer to the set of techniques that induce unsuspecting users to release their data or perform actions that are dangerous to the hygiene of the PC and the network.

With mobile, the probability of success increases. The convenience of mobile devices provides an incentive to take quick decisions and in the case of smartphones, the small interfaces make it difficult to verify the authenticity of links and the vision of key informations.

Because we cannot stand by and watch

The aforementioned Clusit report states that in 2020, there were over 3 trillion euro in damages, almost twice Italy's GDP. They can be of many kinds:

  • direct economic damage

    These can be the costs of business interruption or loss of productivity generated by cyber attacks.

    This was the case at Geox last year: pirates hacked into the company's operating system, stole all the data and locked it. A week stopped, because Geox wanted to restart the data back up, without giving in to ransomware.

  • indirect economic damage

    Think of the interception of sensitive documents, theft of patents, industrial espionage that can put a company at a disadvantage.

  • image damages

    If the data theft concerns customers, their personal data or secreted conversations, we understand that the reputational damage is very high.

But there is a fourth, not unimportant reason: with the edge and 5G there will be huge flows of data that will be processed in real time. Smart applications and devices (the so-called IoT - Internet of Things) will be fully included in the tools that fall within the computer perimeter to be protected.

This means that hackers could sabotage the physical world as well: think of a factory with computer-controlled machinery and what a disaster it would be to lose control even of the production chain and logistics.

Security issues: the modern approach

In the Everywhere Workplace, where perimeter defence is no longer sufficient, new models of cyber-security are needed.

The answer comes to us from the Zero Trust security model, a framework coined by Forrester, which is based on the realisation that not even within one's own corporate network is safe. Traditional approaches - based on user identification - take it for granted that everything within the corporate network is trusted.

It is a "zero" trust approach and its assumption is "never trust, always verify": any user, device, application that attempts to access the corporate network must be verified and so must its context (e.g. the network from which it connects).

Zero Trust combines multiple technologies that ensure secure access to corporate resources from mobile devices. These include user validation tools (e.g. multi-factor authentication), password elimination (Zero Sign-On), device reliability verification, network micro-segmentation, etc., all with the aim of mitigating as far as possible the risks arising from cyber-attacks.

All with the aim of mitigating risks from cyber-attacks as much as possible. The result is edge-to-edge security for any connected device.

The latest in Zero Trust involves the application of Artificial Intelligence: thanks to deep learning and its automated learning capabilities, technologies can detect vulnerabilities in systems and automatically remediate them. Thus preventing any kind of attack or disruption.

02-s pattern02

Would you like to secure remote locations?

CONTACT US FOR AN EVALUATION!