![]() ![]() ![]() 70% are limiting network access of people working remotely to minimize the risk of a breach.80% have deployed a different set of tools and policies to protect hybrid employees.71% expect this hybrid investment focus to increase further in 2023. Four-in-five (82%) security leaders have increased their cybersecurity budget specifically for hybrid workers.HP’s new hybrid security research details how security teams are prioritizing securing the hybrid workplace: Hybrid work security is a key focus for 2023 Adopting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be key for protecting users without impinging on the freedoms that hybrid work allows,” concludes Pratt. To close gaps, organizations must put the endpoint front and center of any security strategy. “The shift to hybrid work requires a move away from old perimeter-focused thinking. Three-quarters (76%) of security leaders agree application isolation is key to protect hybrid worker devices, but only 23% are benefiting from using it at present with 32% planning to deploy in the next 12 months.65% say it is challenging to update their threat detection measures (e.g., Endpoint Detection & Response and Security Information and Event Management tools) to reflect the behavior of hybrid employees, making it harder to spot attacks.66% say the greatest cybersecurity weakness is the potential for hybrid employees to be compromised with phishing, ransomware, and attacks via unsecured home networks cited as the top risks.84% of security leaders say the endpoint is the source of most security threats and where the most business-damaging security threats happen.This requires the creation of new cybersecurity strategies and innovative security tools in response to changing employee behaviors. Securing the endpoint is ground zero for attacks on hybrid workersīeyond PC loss and theft, the endpoint i.e., laptops, PCs or printers – continue to face serious threat from ransomware and is ground zero for attacks on hybrid workers. By adding Wolf Connect to HP Wolf Protect and Trace, teams can accurately report where and when devices were lost, and how long it took to lock or erase them.” ![]() Pratt continues “This is particularly crucial in industries where devices may contain PII (personally identifiable information) or intellectual property. “Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down. “IT teams need a better way to deal with the increase in lost or stolen devices,” continues Pratt.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |