- July 15, 2021
- Catagory Workplace
As offices move to a mix of remote and office work, hybrid security takes on a new meaning. It’s no longer just about securing public cloud services along with on-premises data centers, but also securing the hybrid office.
While many organizations want to go back to pre-pandemic office occupant levels, some are looking at easing into the return to work. The hybrid office will see fewer workers on-site at a time, with employees splitting their time between home and work. Not only do IT teams need to secure remote workers, but they must also be able to secure a workforce that’s even more dynamic. In some ways, every worker is becoming a road warrior that must be kept track of.
Keep tabs on hybrid office traffic
The pandemic brought on a very sudden shift to remote work, but the easy part was every employee was in one place all the time. The hybrid office means workers will be back and forth a lot, and the flow could be uneven and unpredictable, especially if they’re hot desking while on-site.
Hybrid security means you need full visibility and control over all traffic in both your on-premises data center and public cloud platforms, with a clear understanding who is responsibility for security and what the available tools and functions are, but with the added context that many mobile workstations are moving back and forth between two locations. Streamlining applications and platforms, and the tools need to secure the hybrid office, will help to make these traffic patterns clearer. More dashboards to stare at aren’t better.
Employee cybersecurity training and awareness remains key in the hybrid office era. Most business users are not security experts, but people are a critical factor when securing staff who can work anywhere. You need to have policies and controls to govern access to corporate applications, data and infrastructure while also making it easy for people to do their work, so they don’t try to circumvent hybrid security measures. Again, you want to reduce complexity, while still controlling access.
Hybrid security should take a Zero Trust approach
If you want to fully secure your hybrid office, consider taking a Zero Trust approach as to limit user and device access to the applications required to complete work functions.
A Zero Trust architecture assumes everyone is a threat unless they can verify their identify. Requiring employees to do so no matter where they’re working will go a long way to strengthening the security of your hybrid office. Even when employees are in the office—inside the perimeter, so to speak—robust user identification, authentication, authorization, and access permissions remain essential.
In addition to Zero trust approach, you need to always think about security in tandem with networking by leveraging SD-WAN, next-generation firewalls, and advanced routing capabilities. When your employees can work everywhere, your networking becomes a key factor in your hybrid security, just as it does in a hybrid cloud or multi-cloud environment.
Think about flexibility and the future
Many workers want the flexibility of the hybrid office, so you need to consider the future of work as part of your overall security strategy.
Connectivity is key to embracing new cloud platforms and supporting workers wherever they want to work, but it must always be paired with security. You should assume the hybrid office is here to stay and that it will guide your cloud, mobility, and security strategies. A managed security service provider can help you architect your business for the future of work and help you to secure the hybrid office at scale as technologies and threats evolve.
- June 17, 2021
- Catagory Workplace
The move to remote work was a stark reminder of how legacy IT infrastructure can thwart agility and responsiveness. With hybrid workplaces expected to be the new normal, these issues must be dealt with.
These legacy IT infrastructures can comprise software and systems architectures that have been in place for years or possibly decades. Not only do they make it more difficult to securely support hybrid workplaces, but they can also be a barrier to customer-centric commerce and an organization’s digital transformation efforts.
However, legacy IT infrastructure can be upgraded so you can evolve your platforms to effectively support hybrid workplaces and future proof the organization to meet the challenges of your industry and bolster your security posture.
Legacy IT adds risk to hybrid workplaces
Legacy IT infrastructure is more common in some industries than others, and their impact on the ability to be nimble and flexible in delivering products, services, and support employees at the office and at home can vary widely.
One example that illustrates this digital divide is in the financial services sector, where young fintech companies can challenge large incumbent financial institution. They’re embracing a customer-centric, iterative approach to software development and adopting cloud computing and Software-as-a-Service (SaaS) offerings to meet the needs of business users. Regardless of industry, companies embracing these technologies successfully made the sudden shift to remote work at the start of the pandemic and are in a better position to support hybrid workplaces because they are not anchored by legacy IT infrastructures.
These companies have also avoided what is called “technical debt,” which research firm IDC defines as “work left to do.” If an organization accumulates too much of this debt because of budget pressures and deferred technology investment, legacy IT infrastructures can become brittle to the point where it has a significant impact on business operations.
Technical debt is often left undiscovered until the organization looks to implement major changes as part of their digital transformation efforts or respond to a sudden shift such as the move to remote work or hybrid workplaces. Not only is it hard to identify, it’s also hard for IT people to explain the liabilities and consequences of technical debt to business leaders. Even worse, the phenomenon of “bimodal IT,” wherein legacy systems are maintained while modern technologies and development approaches are adopted concurrently, makes technical debt worse because you end of up two different streams of IT. You have one that’s nimble and responsive and one that has legacy IT infrastructure that is difficult to manage and secure.
If organizations want to avoid serious consequences and be able to support hybrid workplaces for the long term, they need a plan to migrate away from legacy IT infrastructures completely and avoid bimodal IT.
Legacy IT infrastructures place a heavy burden on security, which is already a serious challenge in the remote work era. Whether your goal is to embrace digital transformations or support hybrid workplaces, you need to leave legacy IT systems behind.
While it may not be possible to fully eliminate legacy IT infrastructures immediately or completely, a managed cloud services provider can help identify low hanging fruit, applications and data that can be lifted and shift to the cloud, and help you build a modern architecture that better secures remote and supports hybrid workplaces.