Digital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Facebook X (Twitter) Instagram
Trending
  • Diaspora Alumni’s Role In Nigeria’s Socio-Economic Development Tops Agenda At UNIZIK UK Alumni Reunion
  • Google Announces $37 Million AI Investment To Advance Africa’s Research, Talent, And Food Security
  • Anambra’s Digital Leap: GEFAS Mobile Tech Hub Hits The Road With Free WiFi Access
  • Airtel Africa Delivers Strong First Quarter Results As Customer Base And Mobile Money Surge
  • Canal+ Expands African Footprint With $3 Billion Acquisition Of MultiChoice
  • From Mandate To Milestones: Celebrating Hon. Amobi Ogah’s Remarkable Two-Year Journey In The Green Chambers
  • For 16th Year Running, Sophos Named Leader In Gartner’s 2025 Magic Quadrant For EPPs
  • Again, PalmPay Earns Spot On CNBC, Statista’s 2025 Global Top 300 Fintech Companies List
Facebook X (Twitter) Instagram
Digital Times NigeriaDigital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Digital Times Nigeria
Home » Protecting Assets In A Remote-First And Potentially Hostile World
Blog

Protecting Assets In A Remote-First And Potentially Hostile World

DigitalTimesNGBy DigitalTimesNG22 May 2023No Comments4 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
CHESTER
Share
Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp

By Chester WIZNIEWSKI

I live in the city centre and the lunch hour certainly isn’t like it once was. While some people have returned to working in an office, it seems that the majority have not. Looking back, the pandemic will have been a turning point for many things around the world, and the rhythms of office-centered work life will be something that will never return to the old ways.

With this increased flexibility employees are not just working from home behind consumer-grade Wi-Fi routers; they are also spending part of the day at the park or coffee shop, or perhaps even having a “working holiday.” Those in charge of protecting enterprise assets have to assume these endpoints are always in hostile territory.

Even before the pandemic, organizations working toward improving their security maturity were often trying to “push left.”  What is pushing left? At its most basic level, it means moving things closer to the start. It originates from software development where the stages of the development process are conceptualized from left to right, left being the beginning.

In applied security, we also use the term “pushing left,” but rather than referring to the software development process we are referring to the attack chain, which moves from reconnaissance on the left through action (exfiltration or other attacker goal) on the right.

For many years, the most comprehensive security strategies have involved defense in depth. The idea is that not all technologies are suitable for detecting a given threat type, so it is best to deploy them in layers. These layers often directly correspond to how far “left” something is in the attack chain. If you can detect something at the network border through your firewall, email, or web filters, you have contained the threat before it has any negative impact on operations.

READ ALSO  Ways To Improve Customer Satisfaction And Loyalty

Ideally, you want to detect and block an attacker as far left as possible, i.e., as early as possible. Pushing detections left also alerts security analysts that an intrusion may be underway, initiating more focused threat hunting to anticipate gaps in defenses your attacker may be attempting to exploit.

For employees at the office, you can centralize control of these defenses and provide optimum protection. The question is, are you able to provide the same protection for remote workers regardless of their location? Can you monitor and respond to threats being detected on those assets when they are out of the office? As many have observed, this did not work as well as we would have liked when we all went into lockdown, many of us without a plan.

While there are still many benefits to monitoring the network when you have control of it, including reduced endpoint overhead and the ability to keep threats at a distance from sensitive assets, we need to ensure we can take as much of this protection as possible with us when we are out and about.

We must ensure not only that protection is optimized, but also that we don’t lose our ability to monitor, detect, and respond to attacks targeting these remote assets. Most organizations have moved to utilizing EDR/XDR solutions (or plan to in the very near future), which is a great start, but not all solutions are comprehensive.

In the remote-work era, insufficiently protected remote users can encounter plenty of issues – malicious URLs and downloads, and network attacks, to name only the most mundane – that in the Before Times would have been handled by machines guarding the corporate “fort.” The biggest missing components when users are “outside the fort” are HTTPS filtering and web content inspection of the sort that is typically implemented within next-generation firewalls.

READ ALSO  Sophos Report Reveals Expansion Of OCL, Chinese State-Sponsored Espionage In Southeast Asia

When you add these technologies to pre-execution protection, behavioral detection, machine learning models, client firewalls, DLP, application control, and XDR, you are starting to look at a comprehensive stack of defenses for attackers to overcome – even if the endpoints themselves are now free-range.

For initiatives like zero trust network access (ZTNA) to be effective, we must not only wrap the applications we interact with, but we must also wrap the endpoints that connect to them. Simple checks like whether the OS is up-to-date and whether it has security software installed may be a good start, but not all protection is created equal.

With most devices being connected to the internet whenever they’re in use, we can leverage the power of the cloud to help provide ubiquitous protection and monitoring. Modern security solutions must assume the endpoint device or phone is in a hostile environment at all times. The old idea of inside and outside is not only outdated but also downright dangerous.

** Chester Wizniewski is Field CTO Applied Research at Sophos

#Assets #Remote-First #Sophos World
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNITDA, CISCO Sign MoU To Promote Digital Transformation, Literacy
Next Article Digital Economy Has Created Pathway For Emerging Technologies- NITDA DG
DigitalTimesNG
  • X (Twitter)

Related Posts

For 16th Year Running, Sophos Named Leader In Gartner’s 2025 Magic Quadrant For EPPs

22 July 2025

Celebrating Dr. Omoniyi Ibietan’s Multilayered Impact On Strategic Communication In Africa

21 July 2025

From Lagos To The World: NerdzFactory Powers Nigeria’s Leap Into AI Education

9 July 2025

Sophos Enhances Managed Risk Offering With Internal Attack Surface Management (IASM) Powered By Tenable

8 July 2025

Prioritising Security: The Bedrock Of Stronger Workplace Collaboration In Nigeria

7 July 2025

How Agile Project Management And The Scrum Framework Are Powering The Next Generation Of Software In Africa

6 June 2025

Comments are closed.

Categories
About
About

Digital Times Nigeria (www.digitaltimesng.com) is an online technology publication of Digital Times Media Services.

Facebook X (Twitter) Instagram
Latest Posts

Diaspora Alumni’s Role In Nigeria’s Socio-Economic Development Tops Agenda At UNIZIK UK Alumni Reunion

25 July 2025

Google Announces $37 Million AI Investment To Advance Africa’s Research, Talent, And Food Security

25 July 2025

Anambra’s Digital Leap: GEFAS Mobile Tech Hub Hits The Road With Free WiFi Access

25 July 2025
Popular Posts

Building Explainable AI (XAI) Dashboards For Non-Technical Stakeholders

2 May 2022

Building Ethical AI Starts With People: How Gabriel Ayodele Is Engineering Trust Through Mentorship

8 January 2024

Gabriel Tosin Ayodele: Leading AI-Powered Innovation In Web3

8 November 2022
© 2025 Digital Times NG. Designed by Max Excellence LLC.
  • Advert Rate
  • Terms of Use
  • Advertisement
  • Private Policy
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.