security risks - opaqimprovements in network and internet security have pushed cyberattacks out to...

1
Antivirus and firewall protection aren’t enough. With ransomware and other malware figuring in more than 90% of cyberattacks, one wrong click or download by the end-user and the infection can spread laterally (east-west) across the internal network. Improvements in network and Internet security have pushed cyberattacks out to the individual user, primarily targeting them and their workstations in the hope of gaining a beachhead into the corporate environment. This infographic explores the risks to remote workers and the network, and what organizations can do to minimize those risks. CYBERATTACKS 90% 1 Inventory assets. Identify all legitimate endpoints (including BYODs) connecting to your network computing infrastructure. Identify traffic at an advanced application level. Ensure you have protection and processes against suspicious macro enablement, file-less malware threats, and distributed denial of service (DDoS) inlets. 4 2 Leverage cloud-based security solutions to rapidly deploy always-on protection that follows users wherever they go, even when people are not using the enterprise VPN. Ensure you have the ability to quarantine or isolate suspicious or known-infected hosts to reduce the risk of lateral malware spread. 5 3 Make your company a far more difficult target. Protect your authentic users with not only antivirus and antispyware, but multiple-factor authentication and endpoint detection and response (EDR). Encrypt data on the endpoint device’s disk and across the WAN at large. Microsegment. Split WAN traffic into subnetworks to secure communications from workstation to workstation, workstation to server, and server to server, reducing attack surface and risk. 6 Security risks surrounding remote workers are worse than you might think 6 best practices for securing remote workers: Nearly half of CIOs said bring your own device (BYOD) initiatives had increased security risks 5 . The rate at which mobile users are falling for phishing attacks on mobile devices has risen an average of 85% per year since 2011 7 . 87% of companies rely on employees using personal devices to access business apps 4 . 95% of cybersecurity breaches are the result of human error, the attacker most often gaining a foothold through prone end users and not the IT department 3 . A 2018 study discovered a 20% increase in the number of companies compromised by attacks originating at their endpoints 6 . 7 out of 10 organizations did not believe antivirus protection was enough to prevent attacks against their systems 8 . 61% of recorded breach victims were companies with less than 1,000 employees 9 . Securing remote workers is no longer a headache. With OPAQ, you have one cloud, one cloud console, one holistic solution. SECURING REMOTE WORKERS IN A ‘WAN WITHOUT BORDERS’ WORLD www.opaq.com 61% 63% | 60% 95% 80% 7/10 85% 20%^ 50% Footnotes 1) Upwork: “Future Workforce Report,” Feb. 2018. 2) 451 Research: “The Shift to Security as a Service. 3) IBM: IBM X-Force Threat Intelligence Index, 2019. 4) Syntonic, “Syntonic-ISG Research Reveals Employee Apprehension to Use Personal Devices for Work Due to Lack of Reimbursement, Jeopardizing BYOD Productivity Gains,” Nov. 2016. 5) iPass: “An iPass survey – 2018 Mobile Security Report,” March 2018. 6) Ponemon: “2018 State of Endpoint Security Risk,” 2018. 7) Lookout, “Mobile phishing 2018: Myths and Facts Facing Every Modern Enterprise Today,” 2018. 8) Ponemon Institute: “The 2017 State of Endpoint Security Risk.” 9) Verizon: “2017 Data Breach Investigations Report.” 63% of U.S. companies have remote workers 1 and more than 60% say they have moderate to no visibility over all their distributed network assets 2 .

Upload: others

Post on 26-May-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security risks - OPAQImprovements in network and Internet security have pushed cyberattacks out to the individual user, primarily targeting them and their workstations in the hope

Antivirus and firewall protection aren’t enough.

With ransomware and other malware figuring in more than 90% of cyberattacks, one wrong click or download by the end-user and the infection can spread laterally (east-west) across the internal network.

Improvements in network and Internet security have pushed

cyberattacks out to the individual user, primarily targeting them and their workstations in the

hope of gaining a beachhead into the corporate environment.

This infographic explores the risks to remote workers and the network, and what organizations can do to minimize those risks.

CYBERATTACKS

90%

1

Inventory assets. Identify all legitimate endpoints (including BYODs) connecting to your network computing infrastructure.

Identify traffic at an advanced application level. Ensure you have protection and processes against suspicious macro enablement, file-less malware threats, and distributed denial of service (DDoS) inlets.

4

2

Leverage cloud-based security solutions to rapidly deploy always-on protection that follows users wherever they go, even when people are not using the enterprise VPN.

Ensure you have the ability to quarantine or isolate suspicious or known-infected hosts to reduce the risk of lateral malware spread.

5

3

Make your company a far more difficult target. Protect your authentic users with not only antivirus and antispyware, but multiple-factor authentication and endpoint detection and response (EDR). Encrypt data on the endpoint device’s disk and across the WAN at large.

Microsegment. Split WAN traffic into subnetworks to secure communications from workstation to workstation, workstation to server, and server to server, reducing attack surface and risk.

6

Security riskssurrounding remote workers are worse than you might think

6 best practices for securing remote workers:

Nearly half of CIOs said bring your own device (BYOD) initiatives had increased security risks5.

The rate at which mobile users are falling for phishing attacks on mobile devices has risen an average of 85% per year since 20117.

87% of companies rely on employees using personal devices to access business apps4.

95% of cybersecurity breaches are the result of human error, the attacker most often gaining a foothold through prone end users and not the IT department3.

A 2018 study discovered a 20% increase in the number of companies compromised by attacks originating at their endpoints6.

7 out of 10 organizations did not believe antivirus protection was enough to prevent attacks against their systems8.

61% of recorded breach victims were companies with less than 1,000 employees9.

Securing remote workers is no longer a headache. With OPAQ, you have one cloud, one

cloud console, one holistic solution.

SECURING REMOTE WORKERS IN A‘WAN WITHOUT BORDERS’ WORLD

www.opaq.com

61%

63% | 60%

95%

80%7/10

85%

20%^

50%

Footnotes

1) Upwork: “Future Workforce Report,” Feb. 2018.

2) 451 Research: “The Shift to Security as a Service.

3) IBM: IBM X-Force Threat Intelligence Index, 2019.

4) Syntonic, “Syntonic-ISG Research Reveals Employee Apprehension to Use Personal Devices for Work Due to Lack of Reimbursement, Jeopardizing BYOD Productivity Gains,” Nov. 2016.

5) iPass: “An iPass survey – 2018 Mobile Security Report,” March 2018.

6) Ponemon: “2018 State of Endpoint Security Risk,” 2018.

7) Lookout, “Mobile phishing 2018: Myths and Facts Facing Every Modern Enterprise Today,” 2018.

8) Ponemon Institute: “The 2017 State of Endpoint Security Risk.”

9) Verizon: “2017 Data Breach Investigations Report.”

63% of U.S. companies have remote workers1 and more than 60% say they have moderate to no visibility over all their distributed network assets2.