Remote work has created a security gap in organizations, report says

News Desk -

Share

Check Point Software Technologies Ltd., a global provider of cyber security solutions, has announced findings from a new assessment of 1,200 IT security experts worldwide.

As cyber assaults get more complex and target remote workers, businesses want an integrated cybersecurity solution that enhances their defences and increases their agility in the face of attacks.

“While many companies have embraced the new hybrid and remote work models, they have not adopted all of the critical solutions needed to secure their remote workforce. This survey confirmed that organizations have a gap when it comes to users, devices, and access security,” said Itai Greenberg, Vice President of Product Management at Check Point Software Technologies. 

“To bridge this gap, organizations should progress to a Secure Access Service Edge (SASE) architecture. SASE security models provide quick and simple access to corporate applications, for any user and from any device, and protect remote employees from all internet-based threats,” Greenberg added.

The report investigates how the transition to remote work changed firms’ security strategies around people, devices, and access.

According to Check Point Software’s best practises, five important security solutions are required to defend remote users from internet-based attacks: URL filtering, URL reputation, content disarm & reconstruction (CDR), zero phishing, and credentials protection. However, just 9% of firms polled apply all five measures, and 11% do not use any of the mentioned ways to secure remote access to corporate applications.

Key findings from globally are:

  • The remote-access security gap: 70% of organizations allow access to corporate applications from personal devices, such as unmanaged devices or bring your own device (BYOD). Only 5% of respondents reported they use all of the recommended remote access security methods. 
  • The need for internet access security: 20% of respondents reported that they do not use any of the five methods mentioned to protect remote users while browsing the internet, and only 9% use all five methods to protect against internet-based attacks.  
  • A lack of protection against ransomware: 26% of respondents do not have an endpoint solution that can automatically detect and stop ransomware attacks. Thirty-one percent do not use any of the mentioned methods to prevent sensitive business data from leaking outside the organization. 
  • Email and Mobile Security: Only 12% of organizations that allow corporate access from mobile devices use a mobile threat defense solution. This highlights how exposed organizations are too fast moving, 5th generation cyber-attacks that target remote workers.

Check Point Harmony is a unified security solution that protects users, devices, and access points. The solution provides enterprises with comprehensive and powerful workforce security by combining 5 security technologies to give total protection for remote personnel – all in a single, simple-to-use, manageable, and affordable solution.


Leave a reply