The Expanding Cyber Attack Surface: The Era of Remote Working
Paul Harris
Independent CISO | Cybersecurity | FTSE 100 | Executive | Operational & Technology Risk | Digital Transformation | Operational Resilience in Continuity | Chief of Staff | Financial Services | Aviation | Veteran | DV | SC
As organisations worldwide embrace remote working for their employees, clients, and third-party suppliers, the traditional perimeter-based security model has become outdated. The global shift to remote work has exponentially increased the cyber attack surface, exposing companies to a broader range of threats. No longer confined to the security protections of corporate offices, employees and partners are accessing critical systems from personal devices, home networks, and insecure locations.
This article explores the new cyber risks associated with a dispersed, global workforce and offers strategic recommendations for mitigating these risks.
The Increasing Attack Surface: A New Reality
In 2020, the rapid transition to remote working environments saw cybercriminals quickly adapt their strategies to exploit new vulnerabilities. According to a report by Bitdefender, cyberattacks targeting remote workers surged by 238% during the COVID-19 pandemic. Attackers recognised the opportunity in home networks, poorly configured virtual private networks (VPNs), and personal devices that often lack enterprise-level security protections.
A key concern is that traditional security models were designed for a workforce that operates within the physical confines of a corporate office, protected by firewalls, network monitoring, and endpoint protection solutions. The decentralisation of these workforces—along with the increasing reliance on third-party suppliers—has introduced new security challenges:
Real-World Example: In 2021, Colonial Pipeline suffered a ransomware attack that disrupted fuel distribution across the U.S. The attack was enabled by a compromised VPN account that lacked multi-factor authentication (MFA), illustrating the risks associated with remote access to critical infrastructure. The fallout from this attack demonstrated how the expansion of the attack surface could have devastating operational and financial impacts.
The New Threat Landscape: Digital and Cybersecurity Risks
The shift to remote working has introduced several new vulnerabilities that organisations must address to secure their operations. The following sections outline the primary digital and cybersecurity risks faced by global organisations today:
1. Weak Remote Access Security
Remote work environments often rely on VPNs, cloud-based services, and remote desktop tools to enable employees to access corporate networks. However, without proper security configurations, these remote access points become prime targets for attackers. As seen in the Colonial Pipeline attack, VPN vulnerabilities and weak authentication methods can allow cybercriminals to gain unauthorised access to critical systems.
Organisations must address remote access security by:
Quote: "The remote workforce has transformed how companies operate, but it's also stretched security teams thin. Organisations can no longer assume that any device or connection is safe, especially as employees log in from coffee shops, airports, and home offices." – Chad Skipper, Global Security Technologist at VMware.
2. Increased Endpoint Vulnerabilities
With employees using personal devices for work, these endpoints have become one of the most vulnerable parts of an organisation’s network. Many personal devices lack the same endpoint protection software that corporate-managed devices have, and their users often do not adhere to strict patching or security protocols.
To reduce the risk of endpoint vulnerabilities, businesses should:
How well protected are the personal devices your employees use to access critical business systems?
领英推荐
3. Supply Chain and Third-Party Risks
Third-party vendors, suppliers, and contractors often have access to sensitive systems and data, but may not have the same stringent security measures as the organisation itself. Remote work has further amplified this risk, as many third-party actors are now accessing these systems from potentially insecure networks.
According to a report by ENISA, 58% of organisations experienced a third-party breach in 2023, with many of these incidents linked to poor remote security practices. Supply chain attacks are particularly dangerous as they can go undetected for extended periods of time, providing attackers with persistent access to critical infrastructure.
To manage third-party risks, companies should:
Real-World Example: The SolarWinds breach in 2020, and the MOVEit zero-day vulnerability exploit in 2023 revealed the extent to which a third-party vendor could introduce risk to global organisations. Attackers compromised SolarWinds' Orion software, distributing malware to over 18,000 companies and government entities worldwide, leading to a widespread espionage campaign. With MOVEit, attackers — specifically the notorious Clop ransomware and extortion gang — raided globally employed MOVEit File Transfer servers and stole customers’ sensitive data stored within.
What measures are in place to monitor and control third-party access to your critical systems?
4. Phishing and Social Engineering
Phishing attacks remain one of the most effective methods for cybercriminals to gain access to corporate networks. Remote workers, who are often more isolated from colleagues and support teams, can be more susceptible to phishing emails that trick them into revealing credentials or downloading malware.
The Verizon DBIR found that 85% of breaches involved some form of human element, often through phishing or social engineering. Attackers have become more sophisticated, using well-crafted emails or deepfake AI that mimics legitimate requests from managers or IT support.
To combat phishing and social engineering, organisations should:
Tackling the Expanding Attack Surface: Strategic Recommendations
As organisations continue to operate with a global, remote workforce and supply chain, they must adopt a comprehensive security strategy that addresses these new vulnerabilities. Below are key recommendations to tackle the expanding attack surface:
What steps is your organisation taking to ensure that your global workforce and third-party suppliers adhere to the highest cybersecurity standards, especially in remote settings?
Conclusion: Securing the Future of Remote Work
The transition to a remote, global workforce has permanently altered the cyber landscape, expanding the attack surface and introducing new challenges for businesses worldwide. The solution lies in adopting a proactive, multi-layered security approach that includes Zero-Trust, endpoint protection, third-party risk management, and phishing defences.
As Mikko Hypponen, Chief Research Officer at F-Secure, famously said, "If it’s smart, it’s vulnerable." In a world where employees, partners, and suppliers connect to corporate systems from anywhere in the world, this truth has never been more relevant.
By staying ahead of emerging threats and ensuring that every element of the business is secure, organisations can thrive in the remote working era without falling victim to the ever-growing cyber threats.
Activate Innovation Ecosystems | Tech Ambassador | Founder of Alchemy Crew Ventures + Scouting for Growth Podcast | Chair, Board Member, Advisor | Honorary Senior Visiting Fellow-Bayes Business School (formerly CASS)
1 个月Remote work's security risks demand robust defensive strategies.