J.S. Held Releases Insights on Risks & Opportunities Expected to Impact Organizations in 2025
Read MoreIn the first part of this mini-series, we identified that showing everyday users how to secure data may not be as important as highlighting why data security matters. The “why” helps everyday users appreciate and internalize the need for cyber hygiene by demonstrating personal interest, which can improve buy-in. Now, let us close the series with two pertinent 2023 issues.
Evolving externalities, including the pandemic, forced a change in work habits: remote, and subsequently hybrid, workspaces became the norm and will likely persist. For the fortunate ones who kept working during lockdowns, many turned a piece of their home, dining room table, or couch into their new office.
Advances in technology, such as mobile devices and high-speed residential internet connections, allowed a good portion of service industries to operate. But, with benefits and efficiencies come potential risks: in this case, the possible erosion of the security perimeter, which may result in financial and operational impacts not previously seen in an office-only environment.
From a financial perspective, costs are incurred through acquisition of security tools (e.g., monitoring, VPN connections, devices). In the future, information security and financial leaders, together, must manage business related expenses and determine which solutions meet business demands to deliver appropriate return on investment.
Operational impacts to everyday users are a result of changed work habits. A professional workspace has inherent security controls not found in a home office, hotel, or even in a hybrid workspace (e.g., “hoteling” office arrangements can reduce financial real estate burdens but can also come with unintended or hidden security risks). So how are these risks minimized?
Home offices offer convenience, but conveniences may generate lax behavior. “Who is going to break into my home to get into my digital files anyway, right?”
Well, driven malicious actors will follow a bread crumb trail if it is attractive, and a remote workspace is attractive because of the potential soft areas to exploit, such as:
While many issues will be maintained through enterprise programs, such as device management and identity controls, additional controls and support can be added.
A few good practices for mitigating the risks associated with remote and hybrid workforces include:
As mentioned in Part 1 of this series, achieving a secure environment is more than a matter of technology; achieving a secure environment also requires personal interest and personal responsibility. Therefore, tying these controls and support efforts to “why” data security matters will help motivate everyday users to invest personally.
With that in mind, let us close with some tactics to help everyday users prevent traditional and novel attacks.
Whatever their reasons, people have differing attitudes toward digital privacy. But with a little help at the organizational level, perhaps some consistency in behavior can be achieved. For information security and risk management leaders, be mindful that promoting a culture of personal privacy could result in a more secure corporate operating environment.
Remember, with in-office safeguards reduced, each user expands the attack surface. Even informal controls, such as walking over to a colleague’s workspace, are gone, impacting how we handle both benign and sensitive information. For example: water cooler chats have been replaced by group instant messages, but water cooler chats are generally forgotten over time, whereas the internet never forgets.
These changes are openings for social engineering attacks. Having lost “face-to-face” time, everyday users are more susceptible to manipulation, and while these tips may appear basic, they are valuable:
At first glance, these tactics may not appear as overt cybersecurity solutions, but they are because of the focus on neglected (bolded) portions of the following triad: people, processes, and technology. All three need to work in tandem to achieve good cyber hygiene. The bolded items need some attention, as cybersecurity has traditionally been so technology-focused, often leaving people and processes overlooked.
In closing, let us use a sports reference to demonstrate how small, incremental gains can be huge dividends: if you move the ball three and a half yards on every play, every possession results in a touchdown. That’s how to stay ahead in the cybersecurity battle.
We would like to thank our colleagues George Platsis and Ron J. Yearwood, Jr., CISSP, CISM, CIPM, for insights and expertise that greatly assisted this research.
George Platsis is a Senior Director providing Digital Investigations & Discovery services in J.S. Held’s Global Investigations practice. Mr. Platsis is a business professional, author, educator, and public speaker, with an entrepreneurial history and upbringing of over 20 years. He has designed and delivered solutions, and led teams, to improve breach readiness, enterprise-wide and business-unit specific incident response programs, and estate hardening for a series of Fortune 100 clients in healthcare, media, financial services, manufacturing, defense, and commercial electronics industries, including support of clients in the small and medium business space. Additionally, he brings complex investigation and emergency management experience to businesses and individuals seeking to reduce their risk posture. George is a Certified Chief Information Security Officer.
George can be reached at [email protected] or +1 321 346 6441.
This two-part paper focuses on what everyday users can do to help protect data, through the support of leadership and a well-established and well-maintained information security program....
The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed...
This paper examines the inherent risks surrounding the protection of client electronic data on cloud-based platforms that have arisen with the proliferation of the at-home work setting. It also explains why it’s important for users...