Facebook Google Plus Twitter LinkedIn YouTube RSS 菜单 搜索 资源 - 博客资源 - 网络研讨会资源 - 报告资源 - 活动icons_066 icons_067icons_068icons_069icons_070

Tenable 博客

订阅
  • Twitter
  • Facebook
  • LinkedIn

聚焦德国:Hybrid Work Brings New Cyber Risks

聚焦德国:Hybrid Work Brings New Cyber Risks

As German organizations plan their long-term hybrid and remote work models, embracing this new world of work opens the door to new and unmanaged cyber risk. And attackers are taking advantage. To address this, we need to change the way we're thinking about risk.

While the pandemic-driven work-from-home obligation in Germany has been revoked, many organizations still plan to continue long-term hybrid and remote work models. At the beginning of 2020, just 22% of German organizations had employees working remotely. Today, that has risen to 82%, with 65% planning to make this adoption permanent in the next 1-2 years. But, by their own admission, only 58% of German organizations feel they are prepared to support new workforce strategies from a security standpoint.

The self-reported data is drawn from a commissioned study of more than 1,300 security leaders, business executives and remote employees worldwide, including 156 respondents in Germany. The study, Beyond Boundaries: The Future of Cybersecurity in the New World of Work, was conducted by Forrester Consulting on behalf of Tenable in April 2021.

Cloud adoption enables hybrid working model

Historically, German organizations have been reluctant, and some even resistant, to embrace cloud adoption. The pandemic has completely changed that. To facilitate a remote workforce, cloud adoption has accelerated, shattering the boundaries of the corporate network and introducing exponential risk.

Seventy-three percent of German organizations said they have moved business-critical functions to the cloud, including accounting and finance (51%) and human resources (48%). When asked if this exposed the organization to increased cyber risk, 76% of security and business leaders believed it did.

Business-critical systems weren't the only ones shifted to the cloud. More than a third (35%) of German organizations also moved non-critical functions to the cloud in response to the pandemic, despite 57% of security leaders believing this increased their exposure to risk.

Attackers are taking advantage

With little attention given to security during this massive shift, attackers have taken advantage.  Ninety-three percent of German organizations experienced a business-impacting cyberattack* in the last 12 months, with 57% falling victim to five or more.

When looking at the focus of these attacks:

  • 78% resulted from vulnerabilities in systems and/or applications put in place in response to the pandemic

  • 66% targeted remote workers or those working from home

  • 61% involved cloud assets 

  • 61% involved an unmanaged personal device used in a remote work environment


The impact to organizations is far from trivial as 44% suffered a ransomware attack and 35% experienced a data breach.

We need to change the way we're thinking about risk

As organizations adjust to the new world of work — one that combines in-office and work-from-home models — CISOs and infosec leaders must reevaluate their approach to maintaining security in highly dynamic and disparate environments. This includes realigning themselves to the business in order to effectively reduce risk.

Security teams need visibility of their entire threat landscape, with the intelligence to predict which cyberthreats will have the greatest business impact on the organization. In tandem, controls are needed to address the risks introduced by the new world of work.

Improving the way Active Directory is configured and managed is crucial to disrupting attack paths. Organizations need to implement adaptive user risk profiles in order to continuously monitor and verify every attempt to access corporate data based on set criteria — who is requesting access, where are they connecting from and the hygiene of the device being used. If the criteria aren't met, the request is declined.

If cybersecurity strategies fail to keep pace with business changes, today's risk could become tomorrow's reality.

*A business-impacting cyberattack is one which results in one or more of the following outcomes: loss of customer, employee, or other confidential data; interruption of day-to-day operations; ransomware payout; financial loss or theft; and/or theft of intellectual property.

View more study highlights here

相关文章

您是否易受最新漏洞利用的攻击?

输入您的电子邮件以在收件箱中接收最新的 Cyber Exposure 警报。

免费试用 立即购买
Tenable.io 免费试用 30 天

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即注册。

Tenable.io 购买

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

65 项资产

选择您的订阅选项:

立即购买
免费试用 立即购买

免费试用 Nessus Professional

免费试用 7 天

Nessus® 是当今市场上功能最全面的漏洞扫描器。Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并让您调动起 IT 团队的积极性。

购买 Nessus Professional

Nessus® 是当今市场上功能最全面的漏洞扫描器。Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并让您调动起 IT 团队的积极性。

购买多年期许可,即享优惠价格添加高级支持功能,获取一年 365 天、一天 24 小时的电话、社区和聊天支持。完整介绍请见此处。

免费试用 立即购买

试用 Tenable.io Web Application Scanning

免费试用 30 天

完整享有专为现代化应用程序而设、属于 Tenable.io 平台组成部分的最新 Web 应用程序扫描功能。可安全扫描全部在线资产组合的漏洞,具有高度准确性,而且无需繁重的手动操作或中断关键的 Web 应用程序。 立即注册。

购买 Tenable.io Web Application Scanning

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

5 个 FQDN

$3,578

立即购买

免费试用 联系销售人员

试用 Tenable.io Container Security

免费试用 30 天

完整获得已集成至漏洞管理平台之唯一容器安全产品的功能。监控容器映像中的漏洞、恶意软件和策略违规。与持续集成和持续部署 (CI/CD) 系统进行整合,以支持 DevOps 实践、增强安全性并支持企业政策合规。

购买 Tenable.io Container Security

Tenable.io Container Security 经由与构建流程的集成,可供全面了解容器映像的安全性,包括漏洞、恶意软件和策略违规,借以无缝且安全地启用 DevOps 流程。

免费试用 联系销售人员

试用 Tenable Lumin

免费试用 30 天

通过 Tenable Lumin 直观呈现及探索 Cyber Exposure,长期追踪风险降低状况,并比照同行业者进行基准度量。

购买 Tenable Lumin

联系销售代表,了解 Lumin 如何帮助获取整个企业的洞见并管理网络安全风险。