Article

Cyber Threat Landscape 

Considerations for the security of business

Our new normal, translates into increased and sustained remote work, telecommuting and over-reliance on technology and connectivity for business activity and workforce management.

Explore Content

Not every company is fully equipped to operate in this mode and risks to confidentiality, information breaches as well as the secure transfer of data has been heightened exponentially.

The ability to innovate, to use new technologies, and to grow securely requires an end-to-end cyber risk strategy driven by an organization’s executive leadership.

Factors which compromise security in remote environments:

Bring Your Own Device – Many workers do not have company-issued laptops for home use. This means they are accessing corporate networks and systems on devices that may have vulnerabilities or are already being compromised.

Reliance on third-party web-conferencing tools – workers are relying heavily on web conferencing and collaboration tools to do their jobs, which can be compromised by threat actors the recent headlines around “Zoom-bombing” being the most prominent, but not the only, example.

The home computing environment – Enterprises have no control over their workers’ home computing environment. Since everything from televisions to toasters might be connected to the internet, the typical home environment is especially ripe for Internet of Things (IoT) vulnerabilities.

Secure remote access – Most enterprises simply are not ready for a world where most workers must have secure remote access to networks and systems. For organizations relying on legacy systems, this is especially problematic because they are prone to performance, scalability and availability problems.

Insecure "ad hoc" processes – Business processes that were designed for a secure office environment are now being executed across distributed and potentially insecure home environments.

The insider threat – Work and economic climates will continue to contribute to an increased volume of insider threats. Leadership should consider how the enterprise is equipped to pursue a risk-based insider threat monitoring program.

CIOs, CROs and CTOs need to understand the elements at risk within a remote work structure and the impact on performance and confidentiality. As malware , malicious links, phishing, social engineering and fake landing sites are ever present, information security, company reputation and client data is vulnerable.

 

Why Deloitte

Deloitte named a global leader in Cybersecurity Consulting by ALM
Source: ALM Intelligence; Cybersecurity Consulting 2019; ALM Intelligence estimates © 2019 ALM Media Properties, LLC. Reproduced under license

Our Cyber Risk team has support Trinidad companies with their IT controls and secure strategy, performing vulnerability assessments and compliance exercises. With a regional team of 20+ cyber professionals and a  global network of over 10,000 cyber security and forensics professionals, we have the capacity to offer a full range of best-in-class services to address the various aspects of a cyber threat, while assisting your organization through proactive education on current threats, process improvements and risk mitigation.

For a true “work from anywhere” future, security teams – and IT in general – need to develop programs and protocols that enable remote workers to perform their jobs without introducing excessive risk or productivity compromise into the organization.

Did you find this useful?