Skip to content

U.S. businesses plan for office reopening, sparking doubts about hybrid security arrangements

Relocating remote employees to corporate workspaces fuels a new wave of security concerns for Chief Information Security Officers (CISOs).

Companies in the U.S. plan to bring back office work, sparking concerns over hybrid security...
Companies in the U.S. plan to bring back office work, sparking concerns over hybrid security measures

U.S. businesses plan for office reopening, sparking doubts about hybrid security arrangements

As companies announce their plans for a return to traditional office work, the landscape of cybersecurity is undergoing a significant transformation. The COVID-19 pandemic has brought about a seismic shift in the way we work, with many organisations adopting a hybrid work model. This change has presented enormous security challenges, as highlighted by the increasing volume of threats and the creation of new vulnerabilities.

The Rise in Threats and New Vulnerabilities

According to recent data, threat actors are likely to continue targeting the workplace going forward, with a 48% rise in threat volume between March 2020 and February of this year. One of the main reasons for this increase is the increasingly distributed global workforce, which has created new opportunities for cybercriminals.

Company data was likely accessed from unprotected or unmonitored devices during the pandemic, as workers collaborated across often insecure local networks, frequently sharing a Wi-Fi connection with their remotely educated children. This lack of security has exposed many companies to potential data breaches.

The Death of the Traditional Perimeter

The traditional perimeter is no longer effective in today's hybrid environment. With the network being brought into individual homes, the traditional firewalls and VPNs are no longer sufficient to protect systems and data. This is why companies like Google have implemented more advanced security measures.

Google, for instance, operates under a zero trust model called BeyondCorp, which was launched in January for the larger enterprise community. This scalable, agentless module was implemented in response to the 2009 Operation Aurora attacks and aims to provide a more secure way of managing access to company resources.

Alteryx's Approach to Cybersecurity

Alteryx, an Irvine, California-based data analytics firm, is one such company that has had to adapt to the new security challenges posed by the hybrid work environment. The company, which is still operating remotely but has reopened some offices in Munich and Prague, has taken several steps to ensure the security of its data and systems.

Tyler Ward, the Chief Information Security Officer (CISO) responsible for Alteryx's security, has nearly 20 years of IT and cybersecurity experience. He has served as a U.S. Air Force Cyber-Operations leader and dealt with numerous data breaches and regulatory compliance issues. Under his leadership, Alteryx has implemented advanced security measures, focusing on data privacy, penetration testing, and regulatory compliance enhancements.

Policy Considerations for Companies Transitioning to a Hybrid Work Environment

As companies transition to a hybrid work environment, they need to rethink their authentication strategies and develop policies that enable productivity while leaving room for unplanned events. Some important policy considerations include data classification, remote access, acceptable use, and device security.

Microsoft, for example, has approximately 20% of its global workforce back in office after reopening offices in 21 countries. The company has implemented policies that allow for flexible work arrangements while ensuring the security of its data and systems.

In conclusion, the shift to home-based work during the COVID-19 lockdown presented enormous security challenges to companies. However, with the implementation of advanced security measures and the development of new policies, it is possible to navigate these challenges and ensure the security of data and systems in the emerging hybrid environment.

Read also:

Latest