Vector
Vector

Choose your topics

Blogs
3 Best Practices for Data Privacy

With more technology comes more data, and with that a greater need for data privacy enforcement. What best practices should you be following?

Data Privacy
Blogs
How to Prioritize Your Third-Party Risks

How can you prioritize effectively and enhance your organization’s security posture? Here are our top tips for setting up realistic, sustainable processes.

Third-Party Risk Management GRC
Blogs
Top Tips to Save Time When Assessing Third-Party Risks

Is assessing third-party risks taking up too much of your time? How can you make the process more effective and efficient? Find out in the latest post from SureCloud.

Third-Party Risk Management GRC
Blogs
The GRC Trends to Look Out for in 2024

Our GRC experts at SureCloud share their 2024 predictions for the world of governance, risk and compliance.

GRC
Blogs
The Top 5 Challenges of Third-Party Risk Management

With the supply chain now seen as a legitimate attack path, what can your organization do? Let’s explore 5 challenges of TPRM and how to overcome them.

Third-Party Risk Management GRC
Blogs
What is Third-Party Risk Management?

What is third-party risk management and how should you approach it? Find out in this post.

Third-Party Risk Management GRC
Blogs
The Top 4 Challenges of Risk Management

What are the top four challenges of risk management today and how can you overcome them? Find out in this post from SureCloud.

Third-Party Risk Management GRC
Blogs
Transform Compliance into Your Competitive Advantage

In GRC, compliance is often viewed as a cost that makes it harder to pursue growth. Here's how to make it your competitive advantage.

Compliance Management GRC
Blogs
Questions You Should Ask when Preparing For Your First Pen Test

Understand the processes that you and your chosen pentest provider will travel through for your first pen test, from the initial point to the day the test starts.

Penetration Testing
Vector (7)
Vector-1
Cyber Security

Getting your Cybersecurity Ready for the New Normal

Getting your Cybersecurity Ready for the New Normal
Written by

Nick Rafferty

Published on

20 May 2020

Getting your Cybersecurity Ready for the New Normal

 A greater level of remote and agile working is now the new normal, bringing with it a host of cybersecurity challenges and threats; phishing attacks alone are up 600%.
 

Changing workplace habits mean a changing threat landscape

Recent events have forced businesses across the globe to change the way in which they work, with many organizations having to adopt remote working practices in a critically short period of time.

Rather than the gradual, cautious approach most businesses would have preferred to adopt, the majority were forced to jump in at the deep end with new remote working policies in order to maintain their business operations.

Understandably, this rapid shift to remote working meant that the usual cybersecurity assessments and precautions didn’t occur, which has inevitably led to potential compromises. Cybercriminals are taking advantage of this and exploiting the IT vulnerabilities associated with the rapid adoption of large-scale remote working to carry out increased attacks. According to Info Security Magazine, “online threats have risen by as much as six times their usual levels over the past four weeks.”

Not just a short-term fix

Whilst the priority at the start of the pandemic was to keep things running as best as possible, it is important that organisations recognise that this isn’t a case of plugging the gap until things return to ‘normal’. In fact, what was a strange, new way of working a few months ago, will most likely become the ‘new normal’ for many going forward.

While remote working brings a host of benefits even beyond this pandemic, it can also bring a range of new business risks that impact people, processes, and technology. It is therefore crucial that organisations take stock of their new risk and security posture, learn lessons from imposed remote working, and implement a plan to ensure their cyber resilience moving forward.

The 3-step approach to assessing your remote working cybersecurity

The best way to address your cybersecurity posture and successfully enter the new era of remote working is through adopting a three-stage approach.

First of all, organizations need to undertake a response analysis to review and reflect on what occurred from their rapid move to remote working.

The second step is to carry out an assessment of the new security and risk posture, considering factors such as radically changed perimeter security and data leakage potential. It’s inevitable that some elements in the transition to remote working don’t go to plan, or the assessment might highlight some alarming risk factors, but rather than burying your head in the sand, you should see this as an opportunity to improve and move forward confidently.

Finally, based on outputs from the first two phases, a clear plan can be produced to stabilize and secure your business considering new and emerging threats.

SureCloud’s Cyber Resilience Assessment Solution

SureCloud’s Cyber Resilience Assessment (CRA) solution provides security assurance for organizations transitioning to ‘the new normal’ of remote working by allowing you to effortlessly carry out this three-stage analysis.

This is complemented by our phishing simulation and remote vulnerability assessment tools. We also provide useful remote working cybersecurity guides, including best practices, a checklist of security considerations, and security clinics with our expert security consultants. These features, along with access to dynamic reporting using SureCloud’s Gartner recognized platform, mean the Cyber Resilience Assessment solution is an effective way to help your business to validate its cyber resilience, as well as stabilize business operations.

 

Preparing for the future

For the majority of businesses, now that the disruption of the initial transition to remote working has passed, it is time to start planning for the future. The emphasis at the start of this period was simply to keep the lights on, but in order to avoid falling behind, or even worse, falling victim to a cyberattack, we’ve got to start thinking about the long-term. Including, what your policies and plans are when moving back into the office.

To learn more about our Cyber Resilience Assessment tool, click here.

Webinar with CREST President to discuss the New Normal and Beyond…

Check out our fireside virtual conversation on how to ‘Secure Your Cyber Baseline For The New Normal’ with Ian Glover (CREST) and our Risk Advisory Practice Director.

Key takeaways:

  1. ‘Top ten’ return to work tips including establishing new ways of working
  2. Advice on how to secure a new cyber baseline following a crisis
  3. Guidance for defining a resilient cyber strategy

Click here, to check it out. 

 

About SureCloud

SureCloud delivers its services through a cloud-based platform, offering a suite of pragmatic and integrated Cybersecurity, Risk, and Advisory services. SureCloud provides you with confidence and assurance that your cybersecurity and risk postures are defined and managed. Utilizing decades of combined experience, our team of accredited Consultants works alongside you to understand your business objectives, security, compliance and risk requirements, and how these can be affected by the evolving cyber threats of the modern world.