Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceSecurity Education & Training

How the web’s foundational tech is evolving in the era of remote work

By Carlos Morales
Working desktop

Lauren Mancke via Unsplash

December 27, 2024

The internet is a cornerstone of our daily existence. It integrates into every aspect of our lives and is the underpinning of modern communication, work dynamics, and the way we access information across our personal and work lives. However, the foundation of the internet — the Domain Name System (DNS), a system that translates domain names into IP addresses, allowing us to access websites or other online services — remains a mystery to many.

A convergence of factors like increasing remote work, IoT connectivity and internet users’ expectations of seamless and secure online experiences are all drawing renewed attention to the need for reliable DNS solutions.

Advancements in DNS

The sudden transition to remote work in 2020 changed work as we knew it. Businesses scrambled to adapt their operations, and employees had to learn how to access information from disparate locations — inadvertently creating new vulnerabilities in their networks and making them susceptible to a multitude of cyber threats.

A recent Vercara survey revealed that 52% of respondents work outside of company offices, demonstrating that remote work is more than just a passing trend and return to office mandates are still not that prevalent. As individuals access sensitive corporate networks from disparate locations, the vulnerability of DNS infrastructure to cyber threats looms particularly large.

DNS technology has quietly continued to evolve to meet the demands of the modern internet landscape. While the core principles of DNS remain unchanged, several developments have emerged in authoritative and recursive DNS as a response to the shift to remote work, reshaping how organizations leverage DNS to support their distributed workforces. Some developments include optimization for remote access and enhanced security measures.

DNS security challenges amid remote work

With remote work came expanded networks, and with expanded networks came more connected devices and “Bring Your Own Device” (BYOD), which brought new and serious security concerns. Research also revealed that 58% of respondents access work accounts from personal devices, solidifying the need for increased security awareness for remote workforces.

According to IDC’s 2020 Global DNS Report, 79% of organizations experienced a DNS attack, and 82% suffered application downtime (cloud and in-house). Specifically, DNS hijacking attacks — which involve unauthorized changes to DNS settings, redirecting users to malicious websites, or altering DNS records to intercept traffic intended for legitimate servers — emerged as prevalent threats, jeopardizing the integrity and availability of internet services. 

The shift to remote and hybrid working models, coupled with the more recent return to travel, presented new challenges for cybersecurity, as employees began connecting to corporate networks from various locations, such as public Wi-Fi networks, and devices, including personal laptops, tablets, and smartphones, creating new entry points for attackers to exploit. DNS hijacking attacks are particularly effective in compromising victim’s devices because they allow attackers to closely mimic legitimate services.

Using DNS to reduce security risks 

Authoritative DNS services can provide capabilities to counter most common DNS based security threats. Services with integrated protection against DNS based DDoS attacks feature high-capacity networks and DDoS specific technology. Domain Name System Security Extensions (DNSSEC) is a feature in authoritative DNS that ensures that DNS responses you receive come from a valid source preventing DNS hijacking attacks.

Recursive DNS can also be used to provide an additional layer of security. The repercussions of a security breach or a successful ransomware attack are significant, with an average cost of $2.8 million per incident. However, the potentially devastating financial and operational consequences can be avoided by proactively implementing Protective DNS to help detect and mitigate threats in real time, safeguarding against unauthorized access and data exfiltration.  

Protective DNS involves the use of security policies to control and restrict access to specific domains or categories of websites based on their reputation or content. By filtering out malicious domains and blocking access to phishing sites, malware distribution networks, and command-and-control servers, organizations can significantly reduce the risk of employees inadvertently accessing malicious content or falling victim to attacks.

Continuous monitoring of DNS traffic allows organizations to detect and respond to suspicious activity in real-time. By analyzing DNS query logs for anomalies, such as unusual query patterns, sudden spikes in traffic volume, or requests for known malicious domains, security teams can identify potential threats and take proactive measures to mitigate them before they escalate into full-blown security incidents. 

The expanding role of DNS in security postures

Adept IT departments and application owners have been quick to adopt the various security capabilities that authoritative DNS has to offer. DDoS protection is an essential part of protecting the availability of DNS, and DNSSEC ensures the integrity of every DNS transaction.

Training employees and stakeholders on best practices for securely accessing corporate networks and identifying potential threats is a critical component of any comprehensive cybersecurity strategy. Fostering a culture of cybersecurity awareness and accountability can empower employees to take proactive measures against cyber threats. This is a good first step, but it is not enough. Attackers are persistent, well-funded and creative. Eventually, some users will make the mistake of clicking on the wrong link or attachment. This is where recursive-based protective DNS comes into play and prevents that user’s system from accessing the malicious content and completing the attack. 

Understanding the critical role of DNS in maintaining connectivity and security is essential. By demystifying DNS and addressing the security challenges posed by remote work, we can ensure the resilience and integrity of the internet with confidence, protecting against emerging threats while embracing the opportunities that lie ahead. 

KEYWORDS: domain name systems (DNS) attacks remote work remote workers

Share This Story

Carlos morales headshot

Carlos Morales is SVP of Solutions at Vercara. Image courtesy of Morales

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing