Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

1 in 5 companies fully confident infrastructure security can support long-term remote work

remote-work-freepik567.jpg
September 9, 2021

Three in four organizations are currently utilizing a hybrid work model. Employers and employees alike feel this is the best path moving forward. However, only roughly one in five companies (21%) are fully confident their infrastructure security can support long-term remote work. 


The Sungard Availability Services (Sungard AS) survey found that roughly 89% believe a mix of remote and in-office working is the ideal work situation following Labor Day.


This survey was conducted within the Pulse technology executive community from June 24, 2021, to August 1, 2021, where 200 North American IT, Information Security, HR, and Operations leaders responded, representing seven industries at the director level and above in North America.


Eighty-three percent of businesses intend to employ this working model in that same time span. Around three-quarters of organizations (74%) took input from both company leaders and employees into account when making decisions on working models. 


While hybrid is the future of work, many companies are still approaching their network security as if all employees are in the office daily, says Heather Paunet, Senior Vice President at Untangle.


Untangle’s 2020 SMB IT Security Report, for example, revealed that the top two barriers to IT security are budget and employees who don’t follow the guidelines (for example, using the VPN regularly), and most SMBs allocate less than $1000 budget for IT security. 


“Even with a major shift to committing to hybrid work, companies still aren’t increasing their budgets or doing enough to change employees’ behaviors, leaving areas of attack open to cybercriminals,” Paunet explains. “As workers moved to hybrid working, many added unknown software and applications to help while working remotely. While helpful at home, they could prove dubious once on the network. With the workforce spread out across locations, using various networks and devices, the attack surface grows dramatically and becomes an opportunity for cybercriminals. Because employees and their devices are not always behind an office firewall, workers who rotate in and out of the office could be bringing malware hiding in their laptops, waiting to move onto the corporate network. 


Another mistake that companies continue to make is only protecting part of the network. Paunet adds that an example of how companies continue to make the mistake of only securing part of the network is the 2015 Landry data breach, which affected the company’s point-of-sale terminals. Though Landry’s put in place systems so that this type of breach would not happen again, they were breached once again. This time, from a different point of entry that was still not secured. 


Paunet says, “Companies can ensure protection by auditing their whole networking infrastructure and assessing everything that might be vulnerable, and then making a plan with a multi-layered approach to ensure that there are no exposed attack surfaces. To protect their networks, employees and critical data, companies will also need to invest in technology and create new safety protocols to keep their networks safe as employees rotate in and out of the office. This should include effective policies such as network segregation and zero-trust. While perhaps not popular with employees, they are important to keeping networks safe from attacks.”


The Sungard AS study also showed that although less than one in 10 (7.5%) are very confident their security protections against phishing and ransomware attacks are adequate in a largely virtual environment, the vast majority of respondents agree that good security is a must-have for employees to be successful when working from home. Security software that keeps work devices secure (79%), an easy-to-use system that enables employees to share files securely (76%), IT support that specializes in supporting remote workers (71.5%), and high-speed internet connection (60%) are all considered essential items for remote employees. 


Businesses still have more work to do to build a more resilient and sustainable remote working environment. The data shows that 43% of business leaders need to provide employees with improved or more technology to support a thriving remote working environment. Almost every organization (97%) noted plans to adjust their business continuity plans to account for a more permanent remote working environment.


John Morgan, CEO at Confluera, says, “There is a general skepticism and concern in the industry today regarding cybersecurity partly due to the recent high profile breaches but also the fact that many organizations do not have a well planned cyber security strategy. In the haste to support the remote workforce at the start of the pandemic, many organizations took the “user productivity first” mentality that sacrificed, among other things, security. When the remote work model got prolonged, organizations began to address security concerns, especially regarding the cloud, but an overarching security strategy was still lacking.


Fortunately, many organizations are now coming to terms with the long-term remote work model and are starting to address it as part of their ongoing business requirements. With many organizations adopting the cloud, often at an accelerated pace than initially planned, they have lost ground in their overall security posture. Extending existing approaches to the cloud and hoping for the best will not be successful in the long run. It’s also important for organizations to share their security strategy and initiatives to instill employee confidence.”

KEYWORDS: COVID-19 cyber security network security remote work risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

    Is Remote SecOps a Good Long-Term Plan?

    See More
  • 5 minutes with

    5 minutes with Satya Gupta: The surge of remote work and its impact on critical infrastructure organizations

    See More
  • Post-Sales Support Keeps End Users Secure Long-Term

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • High-Rise Security and Fire Life Safety, 3rd edition

See More Products

Events

View AllSubmit An Event
  • October 8, 2025

    How to Support the Security Guard Force in Challenging Environments

    ON DEMAND: In this webinar, Brian Howell, Vice President, Global Head of Security at ADM, shares how his organization fosters trust among their security guard force to improve security posture and the safety of sites, processes and the officers themselves.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing