Remote working security truths after a year of lockdown

Lock on Laptop Screen
(Image credit: Future)

When the last lockdown finally ends, life and business will never be the same again. The pandemic has brought huge changes to the working world, many of which look likely to become long-term, permanent and irreversible.

One of the most significant legacies of the pandemic is likely to be a wider acceptance of home working, which many workers and organizations have to come to see as the new normal. According to a CIPD survey, two-thirds of 2,000 UK companies plan to embrace a hybrid model which will see staff split their time between home and the office. It’s a big change for organizations to grapple with and few businesses have had time to calmly plan policies to suit this new era - until now.

Rapid shifts to new ways of working exposed unexpected security weaknesses, but we are now armed with the benefit of experience to better prepare for the year ahead, whatever it may bring. So how should security professionals prepare for the challenges of this new era.

About the author

Matt Lock is Technical Director at Varonis

A cyber reality check

Unfortunately, companies across the world are facing a forbidding threat landscape right now. We have seen several major incidents during the pandemic, including the SolarWinds and Microsoft Exchange hacks. According to official statistics from the British government’s Cyber Security Breaches Survey 2021, almost half of businesses reported attacks in 2020. Among the organizations that have identified breaches or attacks, around a quarter experience them at least once a week.

At the beginning of the mass shift to remote working, more than 57% percent of IT decision makers believed that remote working would expose their organization to the risk of a data breach and the statistics speak for themselves. Their fears were well-founded.

Companies are now plagued by numerous threats related to the new model of working. Brute-force attacks through VPNs are one of the most common, accounting for roughly 45% of Varonis Incident Response (IR) team’s investigations. Many organizations have disabled built-in lockouts and other restrictions on VPN connectivity to maintain business continuity and reduce IT overheads, making attacks a more viable option.

Malicious Azure apps are also a growing attack vector, while fake Microsoft 365 login screens have been deployed to trick employees into giving up their login credentials. The FBI even averted a potential attack on the AWS cloud and in the process raised many questions about the stability and redundancy of “the cloud” and the technology built on it. If the cloud falls, so does the business which relies on it. In this high-risk environment, the right policy is critical to survival.

Balancing access and security

As well as external threats, organizations face problems from their own staff. Data overexposure is one of the major issues raised by the pandemic. The need to allow remote staff to view and work with central data has resulted in too many employees being unnecessarily granted access. When employees are given unlimited access to vast amounts of data without any form of restrictions, businesses run the risk of losing visibility over their data security.

With complexity comes vulnerability. Working outside their employer’s protective bubble, employees can be more exposed to phishing and ransomware attacks. When organizations are dependent on remote systems made up of vast numbers of endpoints, ransomware is not only more likely to get past defenses, but also has the potential to do more damage. Weaknesses, such as exploits that can bypass multi-factor authentication codes and the potential for insider threats, must be monitored extensively.

It may seem overwhelming, but much can be done to combat the challenges.

Lessons to learn

In the same way that a vaccine can provide significant immunity from Covid-19, companies can take numerous steps to secure their digital assets better. There is no single cure, but by combining different techniques, organizations can significantly improve their security posture.

In the first instance, companies need to assume that their data is stored insecurely. They can no longer bank on being protected by perimeter security, so need to assume a zero-trust stance to adapt to the new world. Regardless of whether an individual is inside or outside of the network perimeter, the model demands that anyone, and anything trying to gain access to the systems must first be verified.

Data protection must be at the heart of every cyber security strategy, but many organizations lack a clear picture of how much of their data is actually under lock and key. With reports showing that 41 percent of organizations had over 1,000 sensitive files open to every employee, it is clear that greater visibility is needed. Firms need to be able to monitor who has access to every piece of information, with an understanding of why and how they have access. Unified audit trails can help employers keep track of their data, providing analytics of who has been opening, creating, deleting or modifying important files and emails.

Making an effort to devise a data protection strategy and getting the fundamentals right in placing controls around the most sensitive information you hold may be the best first step you make in adapting to the new world.

With 20 years’ cyber security experience, Matt’s an expert on data security and an accomplished CISSP Security Consultant, he’s worked with world-leading organisations across insurance, pharmaceuticals, legal, health, entertainment, retail and utilities. As Technical Director at Varonis, he heads up the team which undertakes risk assessments and data governance projects, helping organisations to secure and manage their unstructured data. 

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Large blue eyeball watching businesswoman working at computer
5 cybersecurity habits to take into 2025
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring