How to Keep Hackers Out of Your Distributed Environment

Manuel Reischl
image 2 Min read
Zero Trust Access Management

New normal, new challenges

One of the outcomes of COVID-19 has been our newfound openness to remote work. According to a recent PwC survey, 41% of workers would now prefer their workdays to be fully remote, compared with 29% in January 2021, signaling the desire to work remotely is only ramping up. For cybersecurity teams, this new reality brings with it more threats to tackle—and to be able to do so effectively, they must make sure their strategies change and adapt along with the threatscape.

Without access to office services, remote workers are also using their own personal Wi-Fi, or even worse, unsecured public networks. An unsecured router can be an access point not just for an Advanced Persistent Threat, which is a sophisticated hacker operation targeting a specific business, but also for even the most basic of hackers.

Add to this trivial challenges like BYOD and time zone differences forcing the employee to make security decisions on their own, like verifying the legitimacy of a suspicious instruction.

Bye VPN, Hi Zero Trust

In this reality, good-old VPNs don’t cut it. Zero Trust access solutions are the heirs of VPNs. Their main benefit is replacing all-network access with near-surgical, per-app permission granularity, minding user role, and request context. The Cato SASE Cloud, which belongs to Cato Networks, is an example of such a cloud-native solution. It can accommodate users without the need to deploy dedicated VPN infrastructure, making it especially convenient for workers who work remotely from their first day on the job.

Security solutions to facilitate remote work

In the full article published in CPO Mag, I review some security guidelines to make remote work, well… work. Check them out and contact us should you have questions regarding your specific business case.

Read full article on CPO Magazine



There’s more to see

slider item
Zero Trust Access Management

Adapting Security to Work Anywhere

Guest Writer 31.05.21

“Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]

Read more
slider item
Zero Trust Access Management

Massive Campaign Targeting UK Banks Bypassing 2FA

Guest Writer

On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias “Kr3pto”. […]

Read more
slider item
Zero Trust Access Management

Why Phishing Attacks Increase on Holiday Seasons

Guest Writer

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure