Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

订阅

Spotlight on the Kingdom of Saudi Arabia: The New World Of Work Introduces Risks Attackers Can Utilize

A new world of work has been adopted by Saudi Arabian organizations, with many planning to make hybrid and remote work models permanent. Here’s how these changes are increasing risk.

The transition to cloud adoption and remote work practices, which were being cautiously adopted in Saudi Arabia prior to the pandemic, has accelerated in the past 18 months. Today, 91% of organizations have remote employees, up from just 34% in early 2020. Moving forward, the vast majority of organizations (91%) plan to adopt this working model permanently. But embracing this new world of work opens up new and unmanaged cyber risk.

The self-reported data is drawn from a commissioned study of more than 1,300 security leaders, business executives and remote employees worldwide, including 104 respondents in the Kingdom of Saudi Arabia. The study, Beyond Boundaries: The Future of Cybersecurity in the New World of Work, was conducted by Forrester Consulting on behalf of Tenable in April 2021. 

Introducing a hybrid working model is complex

To facilitate the new world of work, cloud adoption has surged. The majority of Saudi organizations (77%) have moved business-critical functions to the cloud. The vast majority (80%) are now running human resources fully in the cloud or in a hybrid cloud/on-prem model; 60% are doing the same for  accounting and finance.

Yet, by their own admission, 63% of Saudi organizations are prepared to support new workforce strategies from a security standpoint, while 67% believe moving business-critical functions to the cloud exposes the organization to increased cyber risk.

Attackers are taking advantage

The study found that concerns about the security implications of the new world of work are warranted. Ninety-eight percent of Saudi organizations experienced a business-impacting cyberattack* in the last 12 months, with 33% falling victim to five or more. When looking at the focus of these attacks:

  • 86% resulted from vulnerabilities in systems and/or applications put in place in response to the pandemic

  • 71% involved cloud assets

  • 66% exploited an unmanaged personal device used by a remote employee

  • 57% targeted remote workers or those working from home


We need to change the way we’re thinking about risk

The pandemic has seen the corporate perimeter shattered. Organizations must reevaluate their approach to cybersecurity, making sure it is closely aligned to the business, in order to effectively reduce the risks introduced by remote work.

This requires the ability to gain a holistic view of the expanded attack surface — wherever it resides. This needs to be combined with external factors — such as identifying vulnerabilities being actively exploited and the impact these could potentially have on the organization — to enable security leaders to fully comprehend the risks posed.

Given the change to working practices, employees are operating outside the safe confines of the network with a myriad of devices. This elevates the role Active Directory plays and puts new emphasis on the importance of configurations and user privileges. Organizations need to develop adaptive user risk profiles that take context into account — who is trying to access what, where are they doing that from and what are they using to do it. And the activity needs to be continuously monitored. For example, someone using a corporate-owned device within the office perimeter during working hours may be deemed a lower risk than someone connecting using their own device over an insecure WiFi hotspot at 2:00 am.

The new world of work opens up possibilities, for employees, who can now work anywhere, and for the organization, which can benefit from the improved productivity. However, it’s imperative that security and business leaders fully explore and resolve the inherent risks involved to ensure the new ways of working don’t come at too high a cost.

If cybersecurity strategies fail to keep pace with business changes, today’s risk could become tomorrow’s reality.

*A business-impacting cyberattack is one which results in one or more of the following outcomes: loss of customer, employee, or other confidential data; interruption of day-to-day operations; ransomware payout; financial loss or theft; and/or theft of intellectual property

View more study highlights here

相关文章

您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable Vulnerability Management 试用版还包含 Tenable Lumin 和 Tenable Web App Scanning。

Tenable Vulnerability Management

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

100 项资产

选择您的订阅选项:

立即购买

试用 Tenable Web App Scanning

您可以通过 Tenable One 风险暴露管理平台完全访问我们专为现代应用程序量身打造的最新 Web 应用程序扫描产品。可安全扫描全部在线资产组合的漏洞,具有高度准确性,而且无需繁重的手动操作或中断关键的 Web 应用程序。立即注册。

Tenable Web App Scanning 试用版还包含 Tenable Vulnerability Management 和 Tenable Lumin。

购买 Tenable Web App Scanning

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

5 个 FQDN

$3,578

立即购买

试用 Tenable Lumin

使用 Tenable Lumin 直观呈现及探索您的风险暴露管理,长期追踪风险降低状况,并比照同行业者进行基准衡量。

Tenable Lumin 试用版还包括 Tenable Vulnerability Management 和 Tenable Web App Scanning。

购买 Tenable Lumin

联系销售代表,了解 Tenable Lumin 如何帮助您获取整个企业的洞见并管理网络安全风险。

免费试用 Tenable Nessus Professional

免费试用 7 天

Tenable Nessus 是当今市场上功能最全面的漏洞扫描器。

新 - Tenable Nessus Expert
不可用

Nessus Expert 添加了更多功能,包括外部攻击面扫描,以及添加域和扫描云基础设施的功能。单击此处试用 Nessus Expert。

填写下面的表格可继续试用 Nessus Pro。

购买 Tenable Nessus Professional

Tenable Nessus 是当今市场上功能最全面的漏洞扫描器。Tenable Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并调动起 IT 团队的积极性。

购买多年期许可,即享优惠价格添加高级支持功能,获取一年 365 天、一天 24 小时的电话、社区和聊天支持。

选择您的许可证

购买多年期许可,即享优惠价格

添加支持和培训

免费试用 Tenable Nessus Expert

免费试用 7 天

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

已经有 Tenable Nessus Professional?
升级到 Nessus Expert,免费试用 7 天。

购买 Tenable Nessus Expert

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

选择您的许可证

购买多年许可证,节省幅度更大。

添加支持和培训