separator

Workspace Hybride and privacy policy

How to adapt your security policy to a hybrid workspace

The pandemic forced companies to set up remote access. Efficiency was the main priority. To the detriment of data and flow security...

Various studies estimate that around 20% of French employees telework two or three days a week. Despite the government's determination, this proportion is unlikely to increase for a variety of psychological, technical and organizational reasons.

Nevertheless, the idea of a hybrid workspace is gaining ground. This is not good news for stressed and overworked security teams, who are already struggling to respond to internally-generated security events. The pandemic has only exacerbated the stress.

According to a recent report by ESG and ISSA, COVID-19 has not only forced cybersecurity professionals to change their priorities/activities, it has also increased their workload. They must now monitor a larger and more heterogeneous attack surface.

A recent report from VMware Carbon Black revealed that the shift to working from home has led to a 148% increase in ransomware attacks. CE highlighted key areas for security teams to address.

Personally identifiable information (PII) is the main target of cybercriminals. According to Ponemon Institute's latest Cost of a Data Breach Report 2020, 80% of data breaches involve this type of information. This poses two major problems. The first is data security, as remote working effectively widens the attack surface; the second is that the confidentiality of customer data is also compromised.

Hybrid Workspace recommendations

More than ever, companies need to establish a solid foundation for identity governance using the following recommendations:

  • Increase efficiency by implementing automated request and approval processes for system access
  • Cataloguing who has access to which systems and applications
  • Associating identities with roles
  • Ensure that access rights change as role functions evolve
  • Enforce segregation of duties so that multiple roles associated with an identity do not lead to inadvertent access to sensitive systems.
  • Perform regular audits of access and compliance data

Failure to secure data and maintain confidentiality can lead not only to breaches, but also to heavy fines for non-compliance. Governance of data and identities is therefore essential to ensure its long-term survival.

Contact us!

Together we secure your data

In the same category