New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

The future of security protocols for remote work

New York Tech Editorial Team by New York Tech Editorial Team
January 14, 2022
in Cybersecurity
0
The future of security protocols for remote work
Share on FacebookShare on Twitter

Cybercrime has been growing rapidly for years, and the sudden pandemic-fueled shift to work from home (WFH) only accelerated the threat, forcing businesses to start putting a real focus on establishing solid security protocols and building a strong relationship with their cybersecurity vendors.

security protocols work

In such a landscape, we can expect to see an influx of even more cybersecurity startups cropping up to join the many that already exist. We see especially great potential in cybersecurity startups coming from Israel, where there is strong private/public collaboration in the field of cyber and a lot of good cyber talent.

It’s time to rethink security standards

The WFH and hybrid work models dramatically expanded potential attack avenues for cybercriminals seeking access to corporate resources and assets. The need to tighten security standards for businesses across all sectors is both severe and urgent.

Unfortunately, too many companies remain slow to update their security protocols and even slower to implement changes with an upfront cost. Still, there’s no question that how and where employees work has permanently shifted, and security practices must shift too.

VPNs and VDI aren’t enough

Most businesses today use VPNs and virtual desktop infrastructure (VDI) to connect remote workers, but these are insufficient solutions with gaping security holes, as several high-profile breaches have revealed.

It’s also important to note that most VPNs are configured to provide all-or-nothing access. Although administrators can restrict sensitive applications or assets for certain users, this requires a level of management that is simply not practical for most administrators. Consequently, remote workers tend to be given full access to the corporate network. This combination of too little control and too much access creates a recipe for disaster, especially when VPN privileges must be given to third-party vendors or contractors.

Even U.S. President Joe Biden’s cybersecurity executive order recognizes the shortcomings of VPN and VDI and advises shifting toward a zero-trust policy for the federal government.

Security solutions must mitigate human error

An additional point that can’t be overlooked is the plain and simple fact that humans, including the very best employees, make mistakes. Security solutions that do not account for human error will simply not succeed.

For instance, it’s common for developers and IT staff to have to address urgent production issues like bug fixes immediately. If they’re out of the office, they may have to log into the system from whichever network is accessible, whether it’s a hotel network or the public Starbucks Wi-Fi. Inevitably, someone will forget to log out of the system and inadvertently allow attackers, who are always on the lookout for this type of scenario, an easy in.

Zero trust is the future of secure remote work

The adoption of zero trust network access (ZTNA) is the most effective way to improve security for all work environments, whether remote, hybrid or on-site.

In the zero-trust access model, no device, user or identity is inherently trusted. Instead, access is granted based on strong authentication and continuous authorization. In addition, features like supervised access and session monitoring provide an important extra layer of control and verification.

So, how can companies begin to shift from their current security approach (likely the castle-and-moat model) to a zero-trust framework founded on strong authentication and continuous authorization? While it’s true that there is no simple zero-trust switch to flip, the migration need not be as difficult or time-consuming as many fear. If companies choose a vendor that supports them throughout the process, they’ll see a faster ROI with far fewer growing pains than they likely expect.

Segmented access to minimize security breach

It is of vital importance for companies to identify their most vulnerable access points and o secure those first. For instance, instead of granting full VPN access to third-party vendors, these potentially risky users can be given micro-segmented access to only the parts of the corporate network that are essential to their tasks. Since WFH is here to stay, this tactic will keep the risk of an accidental user-error security breach to a minimum.

A zero-trust future is brighter for everyone

There are many real-world examples that show the clear benefits of the zero-trust approach. For instance, zero trust access could have saved Colonial Pipeline millions of dollars and prevented the infamous shutdown. Even if the attackers reached Colonial’s core systems, the ongoing authentication and verification processes that characterize zero trust access would have prevented them from doing lasting damage. As an even more current example, the zero-trust model denies unauthorized users access to critical apps and therefore prevents the exploitation of the newly identified Log4j vulnerability.

Overall, an increase in the implementation of zero trust access solutions will almost certainly lead to a decrease in news headlines about major security breaches. We also believe that integrating AI into these new systems can help identify and close security gaps with no manual input needed.

Contributing author: Sergey Gribov, Partner, Flint Capital

Credit: Source link

Previous Post

Indian mobility tech startup EVage raises $28 mn from US-based VC firm

Next Post

How to improve your IR tabletop exercises and why you really should?

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
How to improve your IR tabletop exercises and why you really should?

How to improve your IR tabletop exercises and why you really should?

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Strengthening Cloud Security With Automation

May 22, 2025
How Local IT Services in Anderson Can Boost Your Business Efficiency

Why VPNs Are a Must for Entrepreneurs in Asia

May 22, 2025

Recommended

Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media