Safeguard against vulnerabilities in the hybrid workspace

By on
Safeguard against vulnerabilities in the hybrid workspace
It is often said that one of the biggest threats to a company’s network is the behaviour of their own employees.
BIT

With a vast majority of companies now reliant on the cloud and virtual conferencing, it is vital that they choose appropriate technology solutions to safeguard against cyber threats and system vulnerabilities.

Over the course of the COVID-19 pandemic, the boundaries of how and where we work have blurred considerably, with many companies moving to a hybrid working model to allow for greater flexibility and seamless collaboration. As businesses globally undergo a digital transformation, moving their services to the cloud to communicate and operate with greater agility, cyberattacks have become an increasingly common reality.

In fact, security firm Crowdstrike found the number of potential attacks detected in the first half of this year was greater than the total number for all of 2019. The Australian Cyber Security Centre (ACSC) reported that during April 2020, it was operating at an elevated level in response to COVID-19 themed cybercrime. The Commonwealth and State government, have been the most targeted sector, followed by companies in the education, banking and financial services, and information technology industries.

With hybrid working now looking like it’s here to stay, it is more important than ever for companies to prioritise network security. Identifying and protecting against wireless system solution vulnerabilities in hybrid meetings, huddle spaces and conferences will help companies secure valuable data. It will also enable companies to lay the right foundations to accommodate the evolving hybrid workforce beyond the pandemic.

In its Annual Cyber Threat Report, the ACSC said it continues to identify many products and services being adopted and implemented by organisations that lack ‘secure by design’ principles. It is important that IT departments check they are operating on a secure conferencing system. Operating on an unsecure network, without a secure conferencing system, makes companies increasingly vulnerable to cyber criminals. What many companies don’t realise is that by compromising on the solution they choose, they not only put company data at risk, but they also decrease the productivity of their employees. Picking the right conferencing system allows workforces to collaborate seamlessly in a safe and secure environment.

Related: What is CPaaS and what does it mean for your business?

During the pandemic, several teleconferencing and collaboration solutions quickly gained global popularity. But as entire workforces rushed to find solutions to enable them to keep operating remotely, IT teams struggled to keep up and perform the necessary security checks. While these popular solutions have facilitated internal collaboration, virtual business meetings, training sessions and other critical interactions, vulnerabilities have now been exposed within many of them. The use of these solutions on personal devices has made it difficult for IT teams to detect vulnerabilities, raising the risk of unauthorised access and potential theft of company data and assets.

We obtained an ISO for its ClickShare product for this very reason. We undertook a comprehensive audit of the product, making sure all security controls had been implemented based on an extensive risk assessment. A secure system will offer multiple in-built layers of security to control the impact of a cyber breach. If one line of defence is compromised, other layers are able to protect against the threat.

It is often said that one of the biggest threats to a company’s network is the behaviour of their own employees. It is likely that businesses will continue to operate in mostly virtual settings for an extended period, meaning employees should be trained about how to reduce the risk of a data breach when using their own devices and software solutions from home.

Companies can strengthen the security of their network by implementing strict identification and authorisation protocols and encrypting all data. This is important to ensure that conferencing solutions are supporting business goals, rather than creating network vulnerabilities, as significant amounts of sensitive data travels across internal networks and the cloud via multiple devices and software solutions. Companies should also check that wireless systems and devices are not publicly accessible when connected to third-party networks.

As coronavirus case numbers fall, office spaces are gradually reopening and staff are returning to the workplace. However, the pandemic has opened our eyes to a new way of working, where remote workers and virtual meetings will be the new norm. The advancements of today’s systems have made it possible for a remote working environment that is wireless, flexible and adaptable – all while being highly secure. With a vast majority of companies now reliant on the cloud and virtual conferencing, it is vital that they choose appropriate technology solutions to safeguard against cyber threats and system vulnerabilities.

Olivier Croly is Senior Vice President, APAC, Barco

Copyright © BIT (Business IT). All rights reserved.
Tags:

Most Read Articles

You must be a registered member of Business IT to post a comment.
| Register

Poll

What would you like to see more of on BiT?
News
Reviews
Features
How To's
Lollies
Photo Galleries
Videos
Opinion
View poll archive

Log In

Username / Email:
Password:
  |  Forgot your password?