Hybrid and remote work arrangements are here to stay. Reduce cyberattack risks to your business by developing the right cybersecurity countermeasures.
Yet in today’s hyper-connected working world, strong 5G connections, ubiquitous WiFi and invisible Internet of Things networks have become critical in conserving energy, reducing operational expenditures, and streamlining inefficient processes. These emerging technologies drive a multi-cloud strategy that seeks to unite the human resources, technology stacks, and information spread out across multiple countries.
Hybrid and remote arrangements are here to stay. To ensure that your employees aren’t putting your business at risk, you’ll need to understand just how large the threat looms, and develop the right countermeasures in response.
Humans tend to be the weakest link in an organisation’s cybersecurity. Few people receive regular and relevant cybersecurity training, and as a result, poor security practices abound. Some examples:
Increased uptake of digital accounts over the past year has actually weakened password hygiene among Singaporeans: some 45% of respondents admitted to reusing login credentials, a practice that increases their vulnerability to hackers.
Given this situation, strong password control must be built into the organisation’s standard operating procedures (SOPs) rather than left to choice. If left to their own devices, users tend towards weak and predictable passwords like “12345678” or “password”. Organisations could defend their infrastructure with single sign-on, digital passports, and digital signatures.
Proper segmentation and segregation of your company’s infrastructure, whether virtual or physical, is also important. Implement encryption, strong passwords, 2- and multi-factor authentication, and regular application of software patches.
The physical infrastructure of home users shouldn’t be ignored. For instance, older WiFi routers may lack encryption out of the box, opening up users to “man in the middle” attacks that allow unauthorised access by savvy hackers.
Separate user traffic from management traffic with out-of-band (OoB) network management. Validate integrity of hardware and software by using verified products rather than those from the grey market. Illegitimate products may be affordable compared to other platforms, but they can come pre-loaded with malicious software that costs your business more in the long run.