HELLO THERE and happy Wednesday! In this edition of PTG Tech Talk, we explore how a business can protect itself from security threats in a hybrid environment.
Here’s a little did you know? to highlight the mid-week fun:
Microsoft’s Azure Firewall blocks millions of attempted exploits daily
DDoS attacks have been ramping up lately – compared to the second half of 2020, the average daily number of attacks stopped in the first half of 2021 rose by 25%
Microsoft Azure DDoS Protection mitigated somewhere from 1,200 to 1,400 unique DDoS attacks every day through the first half of 2021
Over 96 percent of the attacks were of short duration—less than four hours.
Looking to upgrade your office space with tech that works? Get a free room assessment to discover how to transform your old office space into an inclusive hybrid work environment.
TECH TIP
Schedule Meetings Easier
Skip the back and forth about availability and openings and insert your calendar into your email! If you're not sure what type of calendar your recipient is using, you can also create links for each calendar type. It’s certainly a win-win for everyone involved.
HEADLINES
Securing Your Home Team
Giphy
The reality of the world post-COVID is that everything is different than it was before, from personal connections to business meetings and well beyond. To cope with this new norm, many businesses are taking a hybrid work approach, pairing in-person and remote work to fit the needs of their workforce.
As hybrid offices become more common, the attack surface for cyber threats continues to expand. This Forbes article highlights two major technological shifts due to COVID-19: transitioning to the cloud and the need for remote access.
Key Takeaways:
Understanding where security risks come from, given every possible factor at play, means defining risks attached to operations, compliance and data privacy, brand reputation, and employees.
No solution to tech security is absolutely fool-proof, no matter what you plan for, but many are leaning toward more cloud-based systems.
 On-premises solutions aren’t necessarily better than secure cloud options when factors like sophisticated maintenance programs are considered and the risk of being solely responsible for breaches.
Cloud systems can actually have a mitigating effect on data security risk and liability risk.
Endpoint protection is defined as the security to remotely bridged computer networks. To mitigate security risks in hybrid work environments, Computer Weekly says businesses must evolve endpoint security strategies to meet the intricacies of remote and hybrid working environments.
Key Takeaways:
"Ensuring that every distributed corporate device has up-to-date security patches is the primary challenge faced by organizations with remote workforces," according to Andrew Hewitt, a senior analyst at Forrester.
Jake Moore, a security specialist at ESET, believes that organizations should ideally provide hybrid workers with their own dedicated laptops for completing all tasks so those workers won’t need to use personal devices for work purposes.
DEEP DIVE
6 Pillars of Hybrid Security
Microsoft and CISO have identified six pillars – each of which is interconnected by automated enforcement of security policy, correlation of signal and security automation, and orchestration – for securing your hybrid workforce:
Identities – Keeping your identity – for anything that represents people, services, or IoT (Internet of Things, like smart light bulbs and your AppleTV) devices – safe means utilizing multifactor authentication whenever possible. Still not using MFA? We're here to help.
Endpoints – Using zero trust architecture, or assuming everything coming into your network is a threat, helps businesses using a hybrid office model can keep software and hardware costs down.
Applications – Avoid legacy applications that don’t allow for MFA by moving to a serverless, cloud-based SaaS or PaaS-based service – and more.
Network – Attacks are coming fast and furious these days, and your team must be prepared with a segmented layout across the entire network to minimize possible compromised data.
Infrastructure – The new dependence on cloud solutions means more effective threat protection is required, like mitigation strategies and efficient tools that manage access to your networks.
Data – Managing the flow of your data means reconsidering how your team conducts business on a day-to-day level.
For a more detailed breakdown of the six pillars of securing your hybrid workforce, plus tons of data points and deep-dive insight, check out the full blog here!
If you made it this far, we're guessing you either work from home and want to stay secure or maybe you like to read your newsletters from the bottom to the top. Regardless of which is true, please consider sharing this email with a coworker or a friend and follow us on LinkedIn, Facebook, and Twitter!
PTG, 330 Pelham Road, Building A, Suite 200, Greenville, South Carolina 29615, United States, 8645521291