Modern cybersec tools are often inadequate for the remote workforce

Image of padlock against circuit board/cybersecurity background
(Image credit: Future)

Covid-19 may have changed the way many of us work drastically, but what didn’t changed is the way we protect ourselves, our companies, and our digital assets, in this “new normal”. 

But these old methods don’t play well with new ways of working, which is why many firms don’t really consider themselves secure, according to a new cybersecurity report from Thales.

Polling 2,600 IT decision-makers, the company found that for six in 10 respondents, traditional security tools such as VPNs are still the main ways employees access applications remotely. As a result, almost half (44%) aren’t confident their access security systems could scale effectively to secure remote work.

With data breaches and similar incidents growing fast in these past two years, many firms were pushed into adopting modern security strategies, such as Zero Trust, the report further found.

Besides VPN, there are many other systems businesses deployed for remote access, including Virtual Desktop Infrastructure, cloud-based access, and Zero Trust network access/software-defined perimeter (ZTNA/SDP). The latter was also the top choice among companies deploying new tech due to the pandemic.

Zero Trust as a solution

Almost 40% said they plan on replacing their VPN with ZTNA/SDP, while another 38% expect to move to multi-factor authentication (MFA) solution. More than half (55%) have already adopted MFA, but the practice still trails behind other tools, such as firewalls, endpoint security, SIEM and email security. 

But all of this seems to be happening spontaneously, without a serious plan or strategy backing it up. Less than a third (30%) of the respondents said they have a formal strategy and are actively embracing Zero Trust. Almost half (45%) are in the planning phase, at the moment.

“One of the core barriers businesses face when starting their Zero Trust journey is the balance between locking down access without interrupting workflow. People require access to sensitive data in order to work and collaborate and business leaders will need to ensure that a drop in productivity doesn’t become an unwanted side effect. The research shows that IT professionals increasingly see access management and modern authentication capabilities as key components in achieving a Zero Trust model,” said Francois Lasnier, vice president of Access Management solutions at Thales.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
NordVPN CTO Marijus Briedis speaking at a panel during RightsCon 2025 in Taipei, Taiwan, on February 25.
Cyber threats are evolving everywhere – and "prevention alone is insufficient," says NordVPN CTO
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
Latest in Security
Data leak
Top home hardware firm data leak could see millions of customers affected
Representational image depecting cybersecurity protection
Third-party security issues could be the biggest threat facing your business
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Android Logo
Devious new Android malware uses a Microsoft tool to avoid being spotted
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Latest in News
Buzz Lightyear Space Ranger Spin Rennovations
Disney’s giving a classic Buzz Lightyear ride a tech overhaul – here's everything you need to know
Hisense U8 series TV on wall in living room
Hisense announces 2025 mini-LED TV lineup, with screen sizes up to 100 inches – and a surprising smart TV switch
Nintendo Music teaser art
Nintendo Music expands its library with songs from Kirby and the Forgotten Land and Tetris
Opera AI Tabs
Opera's new AI feature brings order to your browser tab chaos
An image of Pro-Ject's Flatten it closed and opened
Pro-Ject’s new vinyl flattener will fix any warped LPs you inadvertently buy on Record Store Day
The iPhone 16 Pro on a grey background
iPhone 17 Pro tipped to get 8K video recording – but I want these 3 video features instead