Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • How to Secure Hybrid Teams Against Insider Threats
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware

How to Secure Hybrid Teams Against Insider Threats

4 years ago Tripwire Guest Authors
How to Secure Hybrid Teams Against Insider Threats

As businesses emerge from the pandemic, many are making strategic decisions about their long-term work arrangements. While there is a substantial debate about remaining remote or bringing people back to the office, many companies are choosing to meet in the middle, embracing a hybrid work arrangement that allows people to work both on-site and remotely.

According to a Gartner survey of industry leaders across representative sectors, 82% of companies plan to provide a remote work option at least “some of the time.” In other words, hybrid work looks to be a permanent fixture, not a reactionary trend, making now the right time for leaders to assess and respond to the cybersecurity concerns created by this flexible work arrangement.

While today’s threat landscape is expansive, Verizon’s annual industry report found that 85% of data breaches are attributable to a “human element,” making it critical that companies enhance their defensive posture accordingly. For leaders looking to secure their hybrid workforces against insider threats, here are three best practices to implement today.

#1 Prepare Employees for Secure Remote Work

For many employees, cybersecurity is an afterthought as they execute their core responsibilities and obligations. However, secure hybrid work doesn’t happen by accident, so companies need to prepare their employees to operate securely in this environment.

For example, phishing scams have increased considerably in the past year. Employees are more likely to engage these malicious messages when working from home, making ongoing awareness training a central priority for hybrid teams.

At the same time, hybrid workers are more likely to mix personal and professional technology, putting sensitive data at risk and exposing companies to potential privacy or regulatory compliance violations.

Unfortunately, some remote workers will abuse the perceived anonymity of their home-bound workspace to abuse or misuse company data. Since trusted insiders have access to critical data, companies need to closely govern this access, prioritizing cybersecurity over broad accessibility.

In total, employee negligence was a factor in 2,962 of the 4,716 insider threat cases examined in IBM’s latest Cost of Insider Threats Report. Simply put, companies can’t afford to let employees self-determine their cybersecurity best practices. Instead, they need to prepare employees for secure remote work. They should enforce these standards using employee monitoring, insider threat detection, and other systems to maintain the same cybersecurity priorities as on-site teams.

#2 Protect Sensitive Data

Unfortunately, even the most well-trained employees are prone to make mistakes. For instance, one survey found that 52% of employees self-report that stress increases the likelihood of a mistake, and more than 40% are negatively impacted by fatigue and distraction.

In addition, potential bad actors may feel emboldened to steal company data or undermine compliance efforts, making it imperative that organizations erect digital guardrails to prevent a catastrophe before it occurs.

Specifically, endpoint data loss prevention software disrupts efforts to remove or manipulate company data, denying insider threats the capacity to create more serious cybersecurity problems. It’s also an effective strategy for enacting data management standards for all employees, ensuring that data misuse isn’t predicated on access alone.

#3 Empower Cybersecurity Staff

Cybersecurity teams have an unbelievably difficult task. Threat actors only have to be successful once to inflict incredible financial, operational, and reputational harm on a company, but cybersecurity staff have to be successful every time. As a result, three-quarters of cybersecurity sector employees feel burned out, and 65% are considering quitting their jobs or leaving the profession altogether. Meanwhile, there are more than 500,000 unfilled cybersecurity jobs in the United States alone, making it difficult for companies to replenish their cybersecurity teams.

That’s why companies need to empower their cybersecurity staff with the tools to secure a hybrid workforce. This starts by reducing the number of security alerts that require direct attention. Seventy percent of cybersecurity professionals say the volume of alerts has more than doubled in the past year, reaching 1,000 a day in 2021.

Unsurprisingly, cybersecurity teams cannot operate effectively when inundated with so many potential threats. Burgeoning automation capabilities offer a ready solution, reducing alert volumes without compromising security. Automation can support cybersecurity teams by:

  • Providing always-on monitoring capabilities that assess for accidental or malicious data sharing or exposure.
  • Reducing the number of cyber threats targeting employees, IT infrastructure, and/or critical data.
  • Preventing data exfiltration before a data breach occurs.
  • Notifying IT personnel of serious risks that demand immediate attention.

As hybrid work becomes the de-facto work arrangement, companies can’t overlook the well-being, sustainability, and effectiveness of their cybersecurity teams. Turning to automation can empower cybersecurity personnel to thrive in this environment.

Conclusion

Whether companies are inviting employees back to the office or implementing a more flexible workplace arrangement, cybersecurity has to be foundational to these efforts. The financial consequences, reputational damage, and regulatory implications are just too steep to leave it up to chance. By addressing the human element, businesses reduce their exposure, positioning themselves to flourish in a post-pandemic, digital-first business environment.


About the Author: Isaac Kohen is VP of R&D at  Teramind, a leading global provider of employee monitoring, data loss prevention (“DLP”), and workplace productivity solutions. Follow on Twitter: @teramindco.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” How to Secure Hybrid Teams Against Insider Threats” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Critical Severity, Malware, Phishing, Privacy, Ransomware, TripWire

Continue Reading

Previous The Next Disruptive ICS Attacker: A Ransomware Gang?
Next Microsoft Security Bulletin Warns of New Windows Print Spooler RCE Vulnerability

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

13 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT