TechnologyHybrid working fuels cyber attacks: how to prevent them?

Hybrid working fuels cyber attacks: how to prevent them?



There is no doubt: hybrid work is here to stay. The model that combines face-to-face and virtual services —implemented after the toughest moments of the global Pandemic— has not only brought us the reconciliation of personal and work life, greater flexibility of schedules and an increase in productivity. It has also forced us to look at ourselves in the mirror on cybersecurity issues. Today, the mobile office has made us freer, but also more vulnerable to cybercriminals.

The computer security of our devices (computers, tablets, mobile phones and even printers) is increasingly compromised. According to data from the World Economic Forum (WEF), between February and April 2020, in the first steps of total confinement, there was a 238% increase in the volume of cyber attacks on a global scale. This is highly relevant: 76% of office employees say that working from home during covid-19 has blurred the border between their personal and professional lives, according to the study Fuzzy Lines and Blind Spots, prepared by HP. This analysis is revealing, indicating that half of employees now see their company device as their personal device.

In Spain, 55.3% of Internet users experienced an incident related to cybersecurity during the first six months of 2021, according to an analysis by the National Cybersecurity Institute

And this carries a risk. Because, without a doubt, teleworking has produced a notable increase in the volume of corporate data accessed from home, including confidential financial records, which poses a greater risk to company information. And at the same time, the number of devices (personal and company-provided) accessing the corporate network from outside the traditional network perimeter has skyrocketed. In Spain alone, 55.3% of Internet users have experienced a cybersecurity incident during the first six months of 2021, according to an analysis by the National Cybersecurity Institute (Incibe).

unexpected guests

The receipt of unwanted messages, such as spam, constitutes the most reported incident (85%), and it is common to find phishing (in which a criminal pretends to be a legitimate entity). Experts agree that it is becoming easier to click on this type of fraud, as criminals have sophisticated their modus operandi, making these messages more attractive. But they also warn that home environments are now full of devices that are a target for cybercriminals, such as those connected thanks to the Internet of Things (IoT). This also includes printers, which are often overlooked by security teams and are easy targets. A 2020 study, cited by KuppingerCole, found that more than half (56%) of printers on the market are accessible through their open ports, which can be hacked.

How to dodge the attacks? The key is to always protect the resources of the staff in any location. To achieve this, companies must ensure that the devices used for remote work have the same level of security as the systems in the office. And for this, a powerful solution is needed that combines protection at three levels: hardware (that is, from the design of the devices, including printers), software and services to deal with criminals. HP Wolf Security offers this holistic protection.

With an eye toward zero trust principles, HP Wolf Security leverages the latest technologies to reduce pressure on the Information Technology (IT) department. From self-healing firmware, in-memory violation detection and threat containment through virtualization, to cloud-based intelligence. HP Wolf Security enables, for example, remote recovery from firmware attacks, improving threat data collection and providing reliable alerts. Protection is active and reactive. From a hardware standpoint, HP Wolf Security provides built-in device protection for computers and printers, with multi-layered security below, within, and above the operating system.

A barrier for home and office

HP Wolf Security dodges malware attacks, quarantines harmful files without user intervention, and thanks to the engine anti phishing, you can verify user credentials, login details and passwords. For home users, HP offers a set of security features that allow the zero trust model to be adapted to the home environment. Thus, independent professionals and any person without distinction will be able to work with all the peace of mind of always being safe. In its business version, HP Wolf Security adds a suite of hardware-enhanced security features that are included with every business PC purchase and is designed for organizations of all sizes. The firm, likewise, has versions for public administrations and large-scale companies (HP Wolf Enterprise Security) and small and medium-sized companies (HP Wolf Pro Security).

HP Wolf Security dodges malware attacks, quarantines harmful files without user intervention, and can verify user credentials, logins, and passwords.

And not only that. The company also has Sure Click Enterprise, which prevents dangerous clicks through the use of micro-VMs (micro virtual machines, a program used to isolate an untrusted computing operation from the system), which is reinforced by a advanced hardware and technology. And to all this offer is added Flexworker, which allows IT managers to increase the productivity of workers while helping to safeguard corporate networks and data. Today, computer criminals work overtime. Now your security should too.