Going hybrid may actually open up your business to more threats

worker
(Image credit: Shutterstock / fizkes)

Going hybrid may actually open up your business to more threats, a new report from HP Wolf Security has found. Its latest global report, “Out of sight & out of mind”, says businesses who deployed a hybrid working model risk having more Shadow IT connecting to their corporate network. With many unsanctioned endpoint devices and tools, and limited visibility, the risk of getting compromised grows. 

Surveying almost 8,500 hybrid-working employees, as well as 1,100 IT decision-makers, the report found almost half of office workers (45%) purchased IT equipment to support home working in the past year. 

Of that number, roughly half didn’t have the devices checked or installed by IT. What’s more, the majority wasn’t thinking of cybersecurity when making their purchasing decision, it was said. 

Phishing threat

At the same time, cybercriminals are getting better at phishing. Employees are clicking on more shady links and downloading suspicious attachments carrying possible malware this year than they did last year, IT pros confirmed, while many remote workers admitted to doing so more often since they started working remotely. To make matters worse, most office workers that click a link or download an attachment, 70% don’t report it to IT. 

They either didn’t want to bother IT, or were afraid of being punished for it. 

Rebuild rates rising

Another metric that suggests cybercriminals are getting better is the rebuild rate - the number of endpoints that require wiping and reimaging due to being compromised. According to the report, four in five (79%) IT teams reported rebuild rates increasing during the pandemic. This number could be even higher, considering the fact that many employees don’t even know they’d been compromised.

"People often don't know if they have clicked on something malicious, so the real numbers are likely much higher," comments Ian Pratt, Global Head of Security for Personal Systems, HP Inc. 

"Threat actors don't always announce themselves, as playing the 'long game' to move laterally and infiltrate higher-value infrastructure has proven to be more lucrative. For example, by using cloud backups to exfiltrate sensitive data in bulk, encrypting data on servers, then demanding a multi-million-dollar ransom.”

Pratt continues: "It shouldn't be this easy for an attacker to get a foothold - clicking on an email attachment should not come with that level of risk. By isolating and containing the threat you can mitigate any harmful impact, preventing persistence and lateral movement."

The rising number of threats also means IT teams need to put in extra effort to deliver support - something that can’t always be easy to achieve. Most IT teams said the time to triage a threat increased in the past 12 months, with two-thirds of alerts being time-wasting false positives. 

You can also stay safe with the best identity theft protection around

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Fraude en ligne phishing
Phishing clicks nearly tripled in 2024 as criminals aim for smarter attacks
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Hardware supply chain threats can undermine your endpoint infrastructure
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
A fresh Samsung Galaxy S25 Edge leak hints at a 2K display and a titanium frame
Hatch Restore 3 in Putty
You can finally start your day with The Office theme song, and I couldn't be more excited