How can organisations enable a productive remote workforce without compromising security?


The world will overcome the Covid-19 pandemic, but are organisations ready for the day after?

As the world slowly approaches a new dawn, reaching the light at the end of the very dark tunnel that has been the Covid-19 pandemic, its effects on every aspect of life have left a trace that will most likely remain for years.

The rapid spread of the virus has dramatically shifted the way organisations work. True, digital transformation and remote accessibility have been increasingly adopted in the past decade, yet few organisations – understandably – were prepared to go fully remote. The new reality, exponentially accelerated by the pandemic, is the perimeterless organisation. While most organisations had an infrastructure and policies that allowed remote access to some corporate resources, almost no organisation had the measures in place to allow full, secure remote access of its entire workforce in order to do their job, or at least most of it.

The reality is quite different when it comes to malicious actors seeking new ways to attack organisations. Malicious actors are dynamic, move fast, and look for any security hole left behind when organisations adopt a new IT infrastructure. To no one’s surprise, there are many. In fact, attack surfaces are exploding and remote endpoints, such as laptops and mobile devices, are a very attractive backdoor to ultimately breach an organisation’s entire network.

Leveraging the state of uncertainty and fear, hackers have succeeded in compromising endpoints and the data they contain by systematically tricking users. A few weeks ago, Check Point researchers uncovered 16 apps masquerading as Coronavirus apps. Users would visit what they thought was an informational site, and unsuspectedly download malicious apps to their devices that could expose their sensitive data. And this is just one example.

One may argue that once the pandemic is over, people will go back to working as they did before. That corporate information will go back into the safe perimeter, closing a dark chapter of any IT department. But this assumption is probably very far from the reality. A cyber-pandemic is most likely around the corner, and the Coronavirus has only accelerated a trend that was already in motion: an enhanced flexibility when it comes to the workplace. And that, is here to stay.

The good news is that a digital transformation does not need to come at the expense of security. IT admins usually face the dilemma of productivity versus security, and at a time when organisations need to reassemble their entire workflows, many are adopting the “looking to the other side and hoping for the best” approach. However, innovating in a fast-paced world doesn’t need to come at the expense of security. Unlike with the Coronavirus, prevention in IT security does exist and the cyber-pandemic is something we have anticipated.

To address the massive reshaping of the modern workforce in the post-Coronavirus era, Endpoint Protection solutions play the critical role in protecting against today’s threats.

So how can organisations enable a productive remote workforce without compromising on security?

A prevention-first approach

It is much less costly and time-consuming to prevent an attack than to detect and remediate it after it has breached the network and caused damage. That is why it is key to invest in security technologies that leverage artificial intelligence, behavioral threat assessments and real-time threat intelligence, and do not rely on signatures only.

Automated remediation features and contextualised insights

Invest in endpoint security solutions that have the ability to quickly triage events, contain infections, fully sterilise the systems, and provide IT admins with full visibility and insights into the attack. This will allow for the peace of mind that, even if malicious actors manage to breach the defense mechanisms in place, no data will be compromised and the organisation won’t suffer from downtime.

A cloud-based management console and scalable solutions that are easy to deploy

Remote, expandable, fully redundant and easy-to-use management is important now more than ever. A unified cloud-based management solution that delivers these capabilities and enables provisioning and monitoring of devices and policies from the cloud will make the ultimate difference when deploying endpoint security solutions.


Join  Gethin Jones, Beyond the Perimeter Security Architect  on 24th September at 16:05 to learn “How resilient is your Endpoint Protection Solution”.  Click here to register for teissR3 Resilience, Response, and Recovery Online Summit 2020.

by Yael Macias, Product Marketing Manager, Endpoint and Mobile Security at Check Point Software Technologies



Source link