Combat New Cyber ​​Threats in Your Hybrid Work Environment (VB Live)



Presented by Field effect

Hybrid work environments create new cyber risks regardless of the size of your business, especially with a spike in cybercrime. Join this VB Live event to learn more about the new risks and how to effectively protect your networks, cloud services, and endpoints.

Reserve your place here for free.

The pandemic has proven that a hybrid work environment is a tremendous boost to employee well-being and productivity, but it is also a significantly increased risk for businesses. In the 2021 Cost of a Data Breach study, the average total cost increased nearly 10% to $ 4.24 million, the highest on record. Costs were even higher when remote working was suspected to be a factor behind the violation, reaching $ 4.96 million.

Employers face a whole new security landscape now that they face a risk factor multiplied by all the ways their employees connect, says Andrew Milne, director of revenue at Field Effect.

“Employers need to embrace the new zero trust model,” says Milne. “Rather than saying ‘How do you protect everything?’ it’s going to be ‘How do you react internally?’ You are looking at the holistic view of the network, rather than looking at a singularity or points of interest.

The problem, as always, is that new technologies create new risks, and the shift to remote working has made it easier for malicious actors to identify vulnerabilities. In droves, they took the opportunity when work became for the most part remote in the COVID era. IT teams were forced to start reacting to new threats on the fly, opening up new vectors that were not there before. On top of that, the increase in Cybercrime as a Service and the automation of malware have put IT managers in a bad spot.

In addition, the more people who work, the greater the risk. But no matter how many employees you have, there is a clear correlation between human activities and risk in an environment. Employee actions, such as falling into a crook’s social engineering trap, or mechanical errors, such as accidentally forwarding an email, etc., can lead to security incidents.

Respond to risks

There are a number of ways to respond to high risk, says Milne. More complexity requires more sophisticated threat detection, more holistic views, and engaged employees.

“We’re talking about education, training and vigilance around the ability to reduce the likelihood of a mistake,” he says. “And while we tell people to be vigilant, we have to give people the tools to react vigilantly, to be part of the overall security vector.”

It is also important to take preventive measures.

“We keep talking about the same things over and over again, which are the easy things people can do,” he says. “We can enable multi-factor authentication. Again, educate employees on cybersecurity and share responsibilities across the company. And invest in security solutions that provide deeper monitoring, like MDR – manage, detect and respond – across the environment.

Yet the biggest problem, he says, is that most companies have skipped so many basic things in the rush to move to a new hybrid environment. Many have not updated their security plans and policies, or appointed someone internally to ensure that there is someone in charge of overseeing the entire process.

“It cannot be a fully shared responsibility,” he explains. “You have to be focused. Someone has to be “the” person. And then find tools to continue to evolve and be holistic, with a 24/7 monitoring approach. Its very important.

Too many security tools are endpoint solutions for a specific part of the solution, but they are not the whole solution. Mitigating risk is about seeing it through a holistic view, not just a singular lens, and finding a solution that takes an end-to-end holistic approach to monitoring, detecting and responding to these elements. This is what eliminates risk from your entire IT environment, adding a level of support.

As we head into 2022 knowing the hybrid is here to stay, Milne’s biggest reminder to security officials is You don’t know what you don’t know. Knowing your network, knowing your threats and knowing how to respond to those threats is essential.

“People are still coming in and doing the cleanup rather than going into a defensive state,” he says. “It is no longer enough to say that they did not know. You need to be in the loop all the time. Once you know it, you can take action.

To learn more about the risks facing businesses moving to hybrid solutions, how to secure your data regardless of the size of your business, and how to move from breach response to threat prevention, don’t miss this VB Live Event.

Register here for free.

You will learn:

  • The greatest cyber risks associated with hybrid environments
  • Emerging threats for start-ups, scale-ups and midsize businesses
  • Steps to create a secure infrastructure for the new labor standards
  • How to Mitigate Risk and Maximize Defense (Even If Your IT Is Outsourced)


  • Andrew Milne, director of revenue, field effect
  • William H. Dutton, Oxford Martin Fellow, Global Cyber ​​Security Capacity Center (GCSCC), University of Oxford
  • Ernie Sherman, President, Powered networks
  • Seth Colaner, Moderator, VentureBeat


Leave A Reply

Your email address will not be published.