V.R.Murralinath – stock.adobe.co
The majority of cyber security professionals say their approach to security will never return to how it was before the Covid-19 pandemic, as they emphasise securing remote workers and cloud deployments as ongoing challenges heading into 2021, according to a report.
Research organisation Dimensional Research polled 613 IT professionals on a global basis, on behalf of security firm Check Point, to assess the lay of the landscape at the end of a tumultuous year, and found that 95% of them had completely changed their security strategies over the course of 2020, in an “unplanned pandemic response”, with only a quarter saying they had stuck to existing security projects.
“The survey shows that a majority of organisations do not expect their current security issues and priorities to change much over the next two years,” said Peter Alexander, Check Point Software’s chief marketing officer. “For many, the rapid changes they made to their networks and security infrastructures in response to the pandemic will be permanent.
“At the same time, cyber attacks and threats are increasing as hackers try to take advantage of those changes. So organisations need to prioritise closing off any security gaps across their new distributed networks, from employees’ home PCs and employees themselves to the datacentre.
“Dealing with the impact of the pandemic on business operations, and ensuring they can continue to operate as efficiently and as securely as possible will be the biggest ongoing challenge for most enterprises,” said Alexander.
Going into 2021, the biggest security challenge will be securing remote workers, cited by 47% of respondents, followed by preventing phishing and social engineering attacks (42%), maintaining secure remote access (41%), and protecting cloud applications and infrastructure (39%).
The survey suggested that these trends will be deep and long-lasting, outpacing other security issues by some margin through to at least 2023 in a clear indication that whatever the new normal actually is, it is probably here to stay.
Check Point said that to put themselves in the best stead to block the growing volumes of threats, security teams now needed to prioritise closing off gaps in their distributed networks, from home PCs and employees themselves all the way to the heart of the datacentre, knitting the whole together with unified management capabilities.
Julia Voo, HP’s global lead for cyber security and tech policy, agreed that the pandemic had weakened traditional approaches to security. “Remote access inefficiencies, VPN vulnerabilities and a shortage of staff that can help the business adapt means data is now less secure,” she said.
As a result of this increased threat surface, organisations can expect to see malicious actors rushing to take advantages of any of these remaining gaps, putting, as Voo’s colleague Boris Balacheff, HP Labs’ chief technologist for security research and innovation, pointed out.
“We have to expect home infrastructure will be increasingly targeted. The scale at which we operate from home increases the incentive for attackers to go after consumer IoT devices and pivot to business devices on the same networks,” said Balacheff. “And as we know, if attackers are successful with destructive attacks on home devices, remote workers won’t get the luxury of having someone from IT turning up at their door to help remediate the problem.
“2020 demonstrated that is has become critical to manage highly distributed endpoint infrastructure,” he added. “Organisations need to accept that the future is distributed. Everything from remote workers’ devices to industrial IoT devices have become the new frontlines of the cyber security battleground in our increasingly cyber-physical world.
“To meet this challenge, organisations need to rethink their security architectures and controls, and embrace the necessary innovation in technology and processes to help them support this new environment. For example, modern hardware technology exists that can help not only protect but also recover employees remotely and securely in the face of destructive attack like those we have seen in the last few years.”
James Muir, threat intelligence research lead at BAE Systems Applied Intelligence, said: “Much has been written about the potential implications of increased remote working on organisational security, with particular attention to increased attack surface through additional devices and different connectivity mechanisms.
“Survey data has suggested that lack of awareness around security best practices has led to an increased rate of data breaches. There have been reports of ‘WFH compromise’ leading to ‘organisational compromise’ – although it is unclear whether these would have occurred from the office anyway.
“Definitive trends in whether remote working has led to increased prevalence of specific attack paths are currently unclear” said Muir.
“However, we expect further attention from both attackers and defenders in 2021. As a global movement to work from home has shifted the enterprise ‘last mile’ to include consumer network-enabled technology, 2021 shapes up to be the beginning of a new revolution in adversary tactics, tools and strategy.”
The remote working surge has also highlighted the criticality of the IT support function to security, with a sharp uptick in the number of inquiries into organisational IT help desks noted in 2020, which will continue, according to Liz Beavers, one of SolarWinds’ head geeks.
“As organisations explore how to drive efficiencies throughout the business, we also anticipate the IT help desk will further embrace technology and streamline their operations to become a more central resource for all employee tech requests: the IT service desk,” she said.
“Before the broader transition can begin, teams must put the proper infrastructure in place so they’re able to sufficiently manage employees’ systems,” said Beavers. “Organisations will then begin to look at how all factions and departments within the business can utilise the service desk. By reviewing – and in some cases rethinking – their processes, we expect to see numerous businesses decide the IT service desk should become the central resource for employees so they can get the help they need, when they need it as remote working becomes the norm.”
Although the IT help desk won’t be responsibly for owning all requests, given their experience and expertise they will become a useful way to help remote employees better address security, Beavers went on.
For example, she said, where a help desk would traditionally have coached a user through a one-off ticket like a password reset, leveraging automated classification and responses in IT service management (ITSM) solutions will help eliminate manual triage, make incident categorisation more efficient, and resolve problems quicker for the user.
For more complex practices like offboarding, or adding new remote devices, help desk teams can also use ITSM platforms to digitise the collection of information, and automate changing access rights.
“Implementing these updates won’t shift the onus from the IT help desk, but it’ll help eliminate service silos and enhance visibility,” said Beavers.
The events of 2020 also brought increased reliance on multi-cloud infrastructures to the fore, as Forrester principal analyst Dave Bartoletti observed.
“Without public cloud apps, development services, tools, and infrastructure available to every business and consumer on demand, imagine how different (and hobbled) the pandemic response would have been. In 2020, cloud proved that, indeed, one should never let a good crisis go to waste,” he wrote.
However, much has already said about how IT teams have struggled to handle increasing number of cloud instances, and Patrick Hubbard, another member of SolarWinds’ team of head geeks, said that multi-cloud strategies had been overhyped from a security perspective, and that it was time to rethink this practice.
“With multi-cloud adoption, there’s a lag between initial investment and deployment,” said Hubbard. “Those who first started with a multi-cloud strategy may grow to realise how expensive and quickly complicated it can get, making the return on investment (RoI) questionable.
“It’s expensive because it requires a high level of understanding for each target platform, a strong development team, an observability and monitoring focus, orchestration-first processes, nearly complete change automation, and more.
“For most businesses, there are also some lost cost opportunities because not all cloud providers offer the same services mix, especially for advanced services – and this is where things start to get more complicated. Businesses must develop and maintain advanced cross-cloud services in-house for anything not common to all target platforms.”
Hubbard urged organisations that have gone down the multi-cloud route to think about their business cases for why they believe multi-cloud meets their business needs to begin with, and if they choose to persist with this strategy, to either better train their teams, or secure the budget to outsource cloud management and monitoring.
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we’ll explore the top five ways data backups can protect against ransomware in the first place.
CIO dashboards can be a vital tool for assessing metrics in real time to gain insight on IT performance and support better …
The business response to COVID-19 has accelerated technology adoption, making emerging technologies a more accessible and …
The Open Group is teaming up with a United Nations agency on best practices, guides and standards to show resource-strapped …
Companies looking to introduce security testing earlier into software development must look past myths and understand what to …
The lack of consistent updates (and the open source nature of the stacks) make the Amnesia:33 vulnerabilities difficult to fix as…
In his GitHub post, researcher Oskars Vegeris discussed Microsoft classifying the vulnerability as “Important” rather than “…
Network performance is a top issue among IT teams and remote workers amid the pandemic and can correlate with other technical …
The Apstra acquisition could help Juniper sell networking hardware and software to heterogeneous data centers and large-scale …
Network teams can avoid signal coverage issues by performing different wireless site surveys as they evaluate new spaces, set up …
Colocation facility costs can include anything from power fees and bandwidth service charges to connectivity expenses, change …
In any multi-tenant IT environment, noisy neighbors can be an issue. Here’s a closer look at how the challenges differ in the …
Use this data center selection checklist to make fair and comprehensive comparisons between colocation data center providers …
Raj Verma, CEO of SingleStore, explains why the vendor rebranded from MemSQL and how its platform is more than just an in-memory …
Collibra CEO discusses the importance of data governance for enterprises and how to tie data governance to business terminology …
The enterprise edition of the MySQL database is being enhanced on Oracle Cloud Infrastructure to enable users to run analytics …
All Rights Reserved, Copyright 2000 – 2020, TechTarget
Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info