Cybersecurity and Remote Work
Brian Wallace
Founder, NowSourcing - Infographic Expert | Google Board Member | International Keynote Speaker | Featured: NYT, Forbes, Mashable | Innovate Summit Creator | Advisory: #SXSW, Lexmark
Newsletter Improvements and Feedback
Thanks all for your feedback on the newsletter! Keep your ideas coming on any topic ideas you'd like to see here at The Visual. And sorry once again for the delay - we'll try to keep on this newsletter schedule (this week was delayed for the holidays).
This Week's Topic: Cybersecurity and Remote Work
Now that CDC guidance is saying that people who are fully vaccinated can go without their masks indoors and outdoors with some exceptions, many are going back to work in the office...or are they? In 2020, a full 62% of Americans were working from home - and many are reluctant to return to an in-person office experience.
If you had a choice to set your own schedule, skip the traffic, and live where you want, why go back? The distributed workforce is on its way to becoming a norm in society. But is it safe? It's hard enough to protect employees from cybersecurity threats in the office, but remote work adds tremendous complexity to the equation.
Learn more about securing remote work in the infographic below:
Infographic courtesy of Beyond Identity
Enjoyed this newsletter? Look for this on LinkedIn and your inbox every Monday at 2pm EST.
Want to see past editions?
Have a suggestion or tip you'd like to see visualized? Comment below or DM me on Twitter.
Protect, Detect, Respond
3 年Its kind of crazy how there are so many different "solutions" to security these days, when in truth, there is no single solution that will solve all your needs. It really has to be a multi-tiered approach as there are so many different threat vectors (Insider, Zero-Day, Advanced APT's) that you need to account for. Many CISO's implement SIEM/DLP/SSO and much more... but it's now impossible (for my fellow humans at least) trying to keep systems upgraded to avoid the onslaught on CVE's that are being discovered, literally by the hour, every single day. Having rapid threat detection and response capabilities are therefore key... Leveraging ML (Buzz Buzz :-) to take a "Data First" approach to classify sensitive information and analyze permissions across the largest/fastest growing data sets of unstructured and semi-structured data is a must. Utilizing AI (Cool Science! :-) to create individual user and device behavior profile baselines is crucial for security across the edge to be able to detect anomalous behavior and automatically shutdown threats before the develop into problems. Whatever approach you take, its key to partner with someone who can help you identify your largest gaps first and start there. You will never arrive at complete security, but don't stagnate on it, or else you become easy prey for the growing market around. Sorry for the TED Talk, just passionate about it. Glad more people are drawing attention to it! Great article! Cheers!
ICS/OT Cybersecurity Practitioner | R&D | Product Security | Threat Modelling | Security Architect | OT GRC | Community Builder | LLM & AI in Cybersecurity
3 年All startups, small to medium-sized businesses should take notice of this and ensure they are in a better situation in the event of the unthinkable happens. It's all about being prepared, having a plan in place, responding to the aftermath, and successfully mitigating and recording the learnings.
Director - Chief Technology Officer at Athena Cyber Security
3 年Brilliant visual Brian - And this is why its imperative for organisations to protect remote workers by having Defence-in-Depth across endpoints. We at Athena Cyber Security have rolled out AppGuard to our remote user base and reduced the attack surface. We highly recommend AppGuard as one of our Zero day products.