Intelligent Tech Channels Issue 38 | Page 39

countries reported a significant increase in COVID-19 phishing scams . And with news of vaccines , many cybercriminals may look to double-down on these scams in 2021 . With a hybrid workforce , organisations can no longer rely solely on corporate network security . Instead , they must find a way to prepare employees to play an active role in keeping data secure .
Employees are an organisation ’ s most significant security asset . With the right training , these individuals can more effectively spot social engineering attacks , thereby reducing the likelihood of a ransomware attack .
• General users : These individuals require secure connections to cloud resources so they can collaborate with their peers .
• Power users : These individuals require a secure wireless connection to access sensitive networks and data without placing the company at risk .
• Super users : These individuals require a secure network connection and enhanced identity verification since malicious actors often strive to use their elevated privileges as part of a credential theft attack .
Developing a cybersecurity strategy for 2021
Most organisations are now fairly wellversed in the needs of a remote workforce . But with some employees moving back to office environments , even while others work from home , these same companies will need to focus on maturing their cybersecurity protections accordingly . Where 2020 was a rebuilding year , 2021 is a growth year .
Start with your people as the foundation for your security strategy
The hybrid work model brings together traditional controls and remote work security protections in new ways . First , organisations must consider the different types of users they will need to keep secure .
Building out a robust cybersecurity plan for a hybrid workforce starts by identifying user types and establishing controls that protect the systems , networks , software and data they need for their jobs .
As part of a hybrid workplace cybersecurity strategy , organisations should also think about ways to better enforce authorisation and authentication policies . For example , Multi- Factor Authentication makes it more difficult for a cybercriminal to compromise user accounts and passwords in a credential theft attack .
Upgrade your connectivity as part of a strategic cybersecurity plan
With employees accessing cloud resources from traditional or home offices , corporate networks must be flexible and fast . A slow network reduces productivity and frustrates employees . To mitigate potential issues , organisations must deploy a solution that provides highperformance bandwidth and better secures the IT stack . SD-WAN offers the answer to both of these problems in the following ways :
INTELLIGENT TECH CHANNELS
INTELLIGENT TECH CHANNELS Issue 38
39