Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Protecting the New Normal: How InfoSec Has Responded to Remote Work
Cybersecurity

Protecting the New Normal: How InfoSec Has Responded to Remote Work

Bill DoerrfeldBy Bill DoerrfeldJune 1, 20226 Mins Read
Facebook Twitter LinkedIn Email
Remote Work Security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Throughout the pandemic, we witnessed a massive shift as companies moved online. Businesses were forced to reinvent themselves with digital consumer-facing portals, and restrictions forced work-from-home policies across the globe. Now, two years in, some companies have embraced a decentralized workforce as the new normal. For example, Airbnb recently announced that employees are free to permanently work from wherever.

This new era of remote work brings many benefits to quality of life. But what’s troubling is that it still poses a significant quandary of balancing flexibility with security. A housebound workforce necessitates a massive influx of employee-owned or company-issued devices, and remote access to company networks poses a misconfigured risk.

New remote collaboration tools and software also carry potential threats that must be mitigated. Even digitally-native organizations are puzzled as to how to effectively secure the soup of remote workers, external contractors, and third-party software required to conduct business in this distributed age.

The 2022 Global State of Security Report, conducted by Infoblox and CRA Business Intelligence, shed some light on network security for work-from-home conditions. According to the report, monitoring remote access is seen as the top challenge in protecting corporate networks against threats or attacks. Below, I’ll review the study’s major takeaways to see how organizations are actively mitigating risks brought on by work-from-home, now two years into the pandemic.

The State of Remote Work

The COVID-19 pandemic truly uprooted normalcy for most knowledge workers. Since the pandemic started in 2020, 52% of organizations have accelerated digital transformation to support remote workers, the report found. In the socially distanced era, “radical decentralization” has become commonplace to stay afloat. In addition to the pandemic, worker shortages and The Great Resignation have combined to influence more flexible working arrangements.

Throughout the pandemic, 49% of organizations deployed remote corporate-owned mobile devices to their corporate network. Although company devices may be easier to tighten, employee-owned devices also increased. 44% of companies added remote employee-owned devices to their network in the past 12 months.

Companies have taken many measures to cope with digital transformation and remote work. For example, 27% added smart kiosks or similar devices to support remote customers, and were likely to enable touchless experiences. The report also found that businesses have added more resources to the network and company databases, increased support for customer portals, hired more IT staff, and moved workloads to cloud service providers. 26% even say they have closed physical offices due to the pandemic.

Coordinating the Decentralized Workforce

To increase security for remote work, IT has adopted a splattering of different approaches. Firstly, protecting the network has been key. As such, 50% of organizations added VPNs or firewalls to their network in the past 12 months. As more and more devices are added to equipment fleets, perimeter-level security must be tightened.

In general, most organizations have doubled down on their efforts in Internet Protocol (IP) management. As such, 40% of organizations now utilize a cloud-managed DDI server, and 26% added an internally-managed DDI server. For those unfamiliar, DDI incorporates the following components:

  • Dynamic Host Configuration Protocol (DHCP) helps configure devices on the IP network automatically.
  • Domain Name System (DNS) translates domain names into uniquely numbered IP addresses.
  • IP Address Management (IPAM) for managing the assignment and use of IP addresses.

Top Cybersecurity Concerns

The threat landscape is vast and varied in today’s interconnected economy. But of all the potential cyber threats, organizations are most concerned with data leakage — 49% of respondents rated it as their topmost concern. This is likely due to the high penalties and loss of reputation that data breaches can incur. Data leakage is followed by ransomware (39%), attacks through remote worker connections (36%), and attacks through cloud services (34%).

Unfortunately, some organizations are unequipped to handle these threats. 23% of respondents feel they are least prepared to defend against ransomware in the next 12 months. This is followed by data leakage (16%), remote connection attacks (14%), and advanced persistent threats (APTs) (10%). APTs include organized threat actors, such as nation-states or hacking groups that gain access to a system for an extended period of time.

The report found that in the last year, on average, an organization suffered five unique incidents, many of which were due to phishing scams and credential stealing. But where exactly do these breaches originate? These incidents arise within a number of vulnerable locations, but weak WiFi is often the weakest link of the company network — 32% of organizations say WiFi was the access point to an attack. Cloud infrastructure, remote endpoints, and third-party supply chain providers are other most common entry points.

Investments In Remote Work Protection

Many InfoSec departments are working with a lack of budget or shortage of security skills. There’s also a general lack of visibility into worker device activity, which could stunt threat detection. As such, 78% of respondents in the U.S. expect their cybersecurity budgets to increase in 2022.

Interestingly, no specific cybersecurity category stands out as remarkably more important than the others. According to the report, leaders are looking to invest in a wide array of solutions:

  • Network security tools (36%)
  • Secure web gateways (34%)
  • Network traffic (32%)Provisioning (32%)
  • Access control and data encryption (29%)
  • Threat intelligence solutions (29%)

When it comes to securing on-premise environments, popular purchase options include DNS security (28%) and network security (26%). Conversely, data encryption (37%) and cloud access security brokers (36%) are the most popular investments for cloud-based security.

The report also found that Secure Access Service Edge (SASE) is becoming more popular to protect remote access — 65% were planning or piloting such a program. We will also likely see additional investment into Domain Name Systems (DNS) — 40% of respondents planned to purchase a hybrid version of DNS security in the coming year. In comparison, 27% cite opting for the cloud-only version.

Final Thoughts

As the report spells out, “information security as it existed before the pandemic isn’t coming back.” Organized cybercrime has become a lucrative and, at times, state-sponsored activity. And, in time, hackers will inevitably leverage new vulnerabilities exposed within work-from-home setups. What’s frustrating is that getting ahead of information security is a game of cat and mouse, since cyber attacks seem to become more and more complex as the protection systems level up.

These currents underscore the need for active threat mitigation and response plans. The good news is that organizations appear to understand the severity of data exposures and are quick to issue fixes — 79% say they can respond to an incident within 24 hours. In addition to quick incident responses, the findings suggest that protecting remote work will take a combination of improved DNS perimeter defenses, cloud and network protections, and SASE frameworks.

Then, hopefully, we can all work from home with a bit more peace of mind.

The 2022 Global State of Security Report surveyed 1,100 IT and cybersecurity excision makers. Above, we focused primarily on the U.S. version of the report. For more global insights, readers can pick up the international version here.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity featured remote work
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

AI Security: Practical Ways Microsoft Users Can Tap Purview to Lock Down Data in AI Use Cases

June 18, 2025

AWS Commits to Digital Sovereignty with Full-Feature EU Cloud

June 18, 2025

Microsoft, AWS, Oracle Lead $1-Trillion RPO Total for Cloud Wars Top 10

June 17, 2025

How ServiceNow and EY Use AI to Merge Brand and Demand in B2B Marketing

June 17, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Security: Practical Ways Microsoft Users Can Tap Purview to Lock Down Data in AI Use Cases
  • AWS Commits to Digital Sovereignty with Full-Feature EU Cloud
  • Microsoft, AWS, Oracle Lead $1-Trillion RPO Total for Cloud Wars Top 10
  • How ServiceNow and EY Use AI to Merge Brand and Demand in B2B Marketing
  • $1 Trillion RPO!

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.