Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: CybercrimeManaged Security Servicescyber threatsData ProtectionRansomware
Author: Scott Gray
Date: July 16, 2024

Working From Home — and Homing From Work — Poses Unique Cybersecurity Challenges

 

Since 2020, working from home has become commonplace. In the wake of the COVID-19 pandemic, almost every company had to switch their traditionally in-office employees to some version of hybrid or remote work. Indeed, working from home became the new “normal” almost overnight.

We all have a variety of collective experiences and observations during this time of no longer commuting to work, sitting in a cubicle, or chatting with coworkers at the water cooler. Here are a few observations about remote work:

    • “I love rolling out of bed and trying to decide to stay in my PJs or put on sweatpants (yoga pants)!”
    • “Pets need to learn Zoom etiquette! Whether they are pawing at the keyboard, knocking the mouse, or sleeping on the floor behind us, our four-legged friends often took center stage during video calls.”
    • “Always make sure of your camera angles, especially if you don’t have any pants on, or are still in your pajamas.”
    • “I waste so much of my workday commuting from my bed to the refrigerator, to my home office, and back to the refrigerator.”
    • “I figured out I could better budget and blend my time between personal and professional tasks. I could do laundry, cook, go to the gym, run errands, and make more convenient doctor’s appointments with time shifting and freedom as the workday never really ends when your office and home are located in the same place.”
    • “I found I hated being away from my coworkers, but after returning to the office for a bit I decided I didn’t miss the office much after all! Working from home kept me more productive and focused without the “office drama” as a distraction.”

On a serious note, remote or hybrid work does offer several challenges for cybersecurity that perhaps we never realized. For both the employee and the employer, cybersecurity has never been more critical — especially now that we’re connecting to our corporate networks from more locations and on more devices than ever before. For example, a cybercriminal now has even more ways (attack vectors) to prey upon employees or organizations. Data breaches, ransomware, and other cyberattacks have never been more sophisticated, pervasive, or ubiquitous, according to security experts.

In fact, according to a recent Wall Street Journal article: “The number of reported data breaches in the U.S. rose to a record 3,205 in 2023, up 78% from 2022 and 72% from the previous high-water mark in 2021, according to the nonprofit Identity Theft Resource Center. Trends are similar in other parts of the world.”

 

“A cybercriminal now has even more ways (attack vectors) to prey upon employees or organizations. Data breaches, ransomware, and other cyberattacks have never been more sophisticated, pervasive, or ubiquitous.”

 

Here are some cybersecurity risks associated with the work-from-home/anywhere movement.

    1. Expanded attack surfaces – With more employees working remotely, the attack surface in organizations has never been larger. More endpoint devices and networking connections greatly increase the workload for security staff.
    2. Limited or little oversight of how remote workers handle data – Despite tools preventing the download of sensitive information to local devices, the reduced oversight outside the office heightens the chances of unintentional or malicious exposure of corporate data.
    3. Challenges in complying with data regulations – Organizations might find regulatory compliance more challenging in work-from-anywhere environments. Remote workers can access and transport data in ways that violate the growing list of data privacy and protection laws.
    4. Increased susceptibility to phishing and other social engineering attacks – Social engineering and phishing attacks are a threat to all workers, whether they are in the office or working remotely. However, such attacks tend to be more successful when aimed at remote workers. Research has found that people working from home can be more distracted and more likely to click on suspicious links. A new trend is attackers using AI to automate social engineering attacks. Remote workers, especially ones who don’t regularly meet in person with others, might have an even harder time distinguishing such attacks from legitimate communications.
    5. Unsecured and vulnerable hardware and networks – The combination of increased remote work and longstanding BYOD policies means many people use personal devices to do their jobs, regardless of whether they have the skills to adequately secure them.

As these challenges indicate, hybrid and remote work pose demonstrable and unique cybersecurity risks. Individuals and organizations need to be vigilant when securing remote environments. Security essentials like Virtual Private Networks (VPNs), secure communication tools, and endpoint security are popular ways to improve security, but is that enough?

Of course, they are all important, but implementing a true multi-layered approach to cybersecurity is always best. If one area fails, there are additional layers to keep your data secure. Additionally, an effective multi-layered strategy should include zero trust security principles. Zero trust assumes that everything can be a threat, thus “never trust, always verify” is at its core. Implementing a zero trust strategy can significantly enhance the security of a remote or hybrid workforce by assuming that threats can exist both inside and outside the network.

 

Here are four simple ways a zero trust strategy can be integrated into a multi-layered cybersecurity strategy for a hybrid or remote workforce:

    1. Strong Access Controls and Authentication – Instead of a one-time authentication process, zero trust always validates user identity and access permissions while logged on to the network. Adding “Least Privilege Access” enforces the principle of least privilege, granting users the minimum level of access necessary to perform their tasks. This minimizes potential damage from compromised accounts.
    2. Enhanced Endpoint Security – Using enhanced endpoint security ensures that only trusted, compliant devices can access corporate resources. Devices must meet specific security standards and be continuously monitored for compliance.
    3. Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) – Both EDR and MDR monitor endpoints for suspicious activities and respond to threats. MDR usually also includes managed “outsourced” monitoring to better detect and respond to security threats in real-time. This service would include advanced technology and skilled security analysts whose expertise is often in short supply and hard to retain if done “in-house.”
    4. 3. Secure Communication Channels – All communications should be encrypted end-to-end, ensuring data integrity and confidentiality even over unsecured networks.
    5. Regular Security Training and Awareness Programs – Training employees on an ongoing basis is critical to recognizing and reporting suspicious activities and should never be discounted or ignored.
    6. 5. Zero Trust Architecture – Employing zero trust architecture (ZTA) means focusing on securing data and ensuring that sensitive information is protected, regardless of where it is accessed or where it resides. Zero trust enforces security policies consistently across all devices and locations.

ZTA provides a comprehensive framework that supports identity and access management which ensures consistent application of zero trust principles across all users and devices. Security Information and Event Management (SIEM) solutions can aggregate and analyze security data, supporting continuous monitoring and threat detection.

 

So, while you might find working from anywhere to be a huge perk (and it is), it is also important that you understand the cybersecurity risks it poses to your company or organization. I often miss the days of a four-digit login. I often complain about the effort that is required, especially when I am in a hurry, to log into my corporate network, or even to access my device. However, this is a small price to pay to safeguard both my personal and corporate data, which, for years, has been the lifeblood of any organization.

Nobody wants to be the next security breach headline! Better awareness of cyber risks and security practices go a long way in securing both your data and your organization’s data.  When organizations integrate additional security measures along with zero trust principles, they can create a robust, adaptive security environment. Doing so better protects their remote and hybrid workforce from continual cyber threats — even when their dog decides to jump up on their lap in the middle of a video call!

 

 

For more information on managed security tools check out the data sheet links below.

  • Managed Security
  • Managed SIEM
  • Managed EDR
  • Managed Detection and Response

 

Categories: Covid-19 Pandemic, Cybercrime, Ransomware, SecurityBy Scott GrayJuly 16, 2024
Tags: CybercrimeManaged Security Servicescyber threatsData ProtectionRansomware

Author: Scott Gray

Scott Gray is a Product Marketing Manager at 11:11 Systems focused on managed security where he helps create product messaging and communications. As a "product guy" at heart, Scott has over 30 years of experience working in the IT and Consumer Electronics industries. Before joining 11:11 Systems Scott held roles at Compaq, Dell, HP, Panasonic, and Sharp in a variety of product management and product marketing roles. Scott graduated with a master's degree in International Business from Roosevelt University and also holds an undergraduate degree in Marketing from Oklahoma State University. Scott enjoys spending time with his family and is an avid sports fan.

Post navigation

PreviousPrevious post:11:11 Systems Celebrates Eight Leaders Recognized as CRN 2024 Women of the ChannelNextNext post:Transforming Sales Enablement: The New Era of Lab Engine 

Related Posts

Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
vulnerability management
A Modern Approach to Managing Vulnerabilities
May 30, 2025
Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
ransomware attack, worst day
The Remedy Against Ransomware: Insights from Our April 2025 Webinar
May 19, 2025
Cyber Resilience
Reimagining Cyber Resilience in the Gambling Industry: A Strategic Imperative for the Digital Age
May 13, 2025
effective passwords
Creating Effective Password Policies in Your Organization
May 5, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top