Skip to main content

Cyber Threat Landscape

Considerations for the security of business

Our new normal, translates into increased and sustained remote work, telecommuting and over-reliance on technology and connectivity for business activity and workforce management.

Not every company is fully equipped to operate in this mode and risks to confidentiality, information breaches as well as the secure transfer of data has been heightened exponentially.

The ability to innovate, to use new technologies, and to grow securely requires an end-to-end cyber risk strategy driven by an organization’s executive leadership.

For a true “work from anywhere” future, security teams – and IT in general – need to develop programs and protocols that enable remote workers to perform their jobs without introducing excessive risk or productivity compromise into the organization.

Factors which compromise security in remote environments:

 

Many workers do not have company-issued laptops for home use. This means they are accessing corporate networks and systems on devices that may have vulnerabilities or are already being compromised.

workers are relying heavily on web conferencing and collaboration tools to do their jobs, which can be compromised by threat actors the recent headlines around “Zoom-bombing” being the most prominent, but not the only, example.

Enterprises have no control over their workers’ home computing environment. Since everything from televisions to toasters might be connected to the internet, the typical home environment is especially ripe for Internet of Things (IoT) vulnerabilities.

Most enterprises simply are not ready for a world where most workers must have secure remote access to networks and systems. For organizations relying on legacy systems, this is especially problematic because they are prone to performance, scalability and availability problems.

Business processes that were designed for a secure office environment are now being executed across distributed and potentially insecure home environments.

Work and economic climates will continue to contribute to an increased volume of insider threats. Leadership should consider how the enterprise is equipped to pursue a risk-based insider threat monitoring program.

CIOs, CROs and CTOs need to understand the elements at risk within a remote work structure and the impact on performance and confidentiality. As malware , malicious links, phishing, social engineering and fake landing sites are ever present, information security, company reputation and client data is vulnerable.

Why Deloitte

Deloitte named a global leader in Cybersecurity Consulting by ALM

Source: ALM Intelligence; Cybersecurity Consulting 2019; ALM Intelligence estimates© 2019 ALM Media Properties, LLC. Reproduced under license

Our Cyber Risk team has support Trinidad companies with their IT controls and secure strategy, performing vulnerability assessments and compliance exercises. With a regional team of 20+ cyber professionals and a  global network of over 10,000 cyber security and forensics professionals, we have the capacity to offer a full range of best-in-class services to address the various aspects of a cyber threat, while assisting your organization through proactive education on current threats, process improvements and risk mitigation.

Recommendations