{"id":96906,"date":"2021-10-27T09:00:46","date_gmt":"2021-10-27T16:00:46","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=96906"},"modified":"2024-09-12T13:50:12","modified_gmt":"2024-09-12T20:50:12","slug":"new-insights-on-cybersecurity-in-the-age-of-hybrid-work","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/10\/27\/new-insights-on-cybersecurity-in-the-age-of-hybrid-work\/","title":{"rendered":"New insights on cybersecurity in the age of hybrid work"},"content":{"rendered":"
As we approach the last week of Cybersecurity Awareness Month<\/a>, I think about what is top of mind for myself and my peers in security. The past year has continued the 2020s major shift in the way organizations operate. Recent data shows that 81 percent of enterprise organizations have begun the move toward a hybrid workplace, with 31 percent of those surveyed already fully adopted. As the public and private sectors continue to enable hybrid work, the attack surface for cyber threats has expanded, and threat actors have been quick to exploit any vulnerabilities. In response, organizations have enforced various security controls to revamp their security postures. For example, the number of Microsoft Azure Active Directory (Azure AD) Conditional Access policies<\/a> deployed has more than doubled over the last year.<\/p>\n <\/p>\n Figure 1: Rate of onsite versus remote work at Microsoft (Jan 2020 to Aug 2021).<\/em><\/p>\n Organizations that don\u2019t maintain basic security hygiene practices in the new workplace\u2014applying updates, turning on multifactor authentication<\/a> (MFA)\u2014are placing their data, reputation, and employees\u2019 privacy at much greater risk. On October 7, 2021, we published the 2021 Microsoft Digital Defense Report<\/a> (MDDR) with input from thousands of security experts spanning 77 countries. In the report, we examine the current state of hybrid work and recent trends in cybercrime. You\u2019ll also get actionable insights for strengthening defenses across your entire organization.<\/p>\n Along with basic security hygiene, adopting a Zero Trust<\/a> security strategy protects your digital estate by applying a \u201cnever trust, always verify\u201d approach. The prevalence of cloud-based services, IoT, and the use of personal devices (also known as bring your own device or BYOD) in hybrid work environments has changed the landscape for today\u2019s enterprise. Unfortunately, security architectures that rely on network firewalls and virtual private networks (VPNs) to isolate and restrict access to resources won\u2019t cut it for a workforce that operates beyond traditional network boundaries.<\/p>\n There is no one-size-fits-all approach to Zero Trust implementation<\/a>, and that\u2019s a good thing. It means you\u2019re free to start anywhere. Organizations of all sizes begin in different areas, based on their immediate needs and available resources. Most organizations approach Zero Trust as an end-to-end strategy that can be completed over time.<\/p>\n <\/p>\n Figure 2: Zero Trust implementation areas (from the Microsoft Security Zero Trust Adoption Report<\/a>).<\/em><\/p>\n Zero Trust controls and technologies are deployed across six technology pillars. Each pillar in a control plane is interconnected by automated enforcement of security policy, correlation of signal and security automation, and orchestration:<\/p>\n Identities can represent people, services, or IoT devices. As companies adapt for a hybrid workforce, we\u2019ve seen more than a 220 percent increase in strong authentication usage (like MFA) in the last 18 months. Still, in Azure AD<\/a> for the calendar year to date, we\u2019re observing 61 million password attacks daily. Strong authentication can protect against 99.9 percent of identity attacks, but even better is passwordless authentication<\/a>, which can provide the most usable and secure authentication experience. Legacy protocols<\/a>, such as IMAP, SMTP, POP, and MAPI, are another major source of compromise. These older protocols do not support MFA; for that reason, 99 percent of password spray and 97 percent of credential-stuffing attacks exploit legacy authentication.<\/p>\n Once an identity has been granted access, data can flow to different endpoints<\/a>\u2014from IoT devices to smartphones, BYOD to partner-managed devices, on-premises workloads to cloud-hosted servers\u2014creating a massive attack surface. With the Zero Trust model, enterprises can reduce provisioning costs and avoid additional hardware purchases for work-from-home use. For example, an administrator can grant access only to verified and compliant devices while blocking access from a personal device that\u2019s been rooted or jailbroken (modified to remove manufacturer or operator restrictions) to ensure that enterprise applications aren\u2019t exposed to known vulnerabilities.<\/p>\n Modernized applications and services require users to be authenticated prior to having access. However, thousands of applications and services still remain heavily reliant on network firewalls and VPNs to restrict access. These traditional architectures built for legacy applications were designed for lateral connectivity (CorpNet) rather than micro-segmentation. They violate the fundamental Zero Trust principle of \u201cleast-privilege access\u201d and are more vulnerable to lateral movement across the network by an adversary. To modernize your applications, deploy one of these three solutions:<\/p>\n Microsoft Azure Firewall<\/a> blocks millions of attempted exploits daily. Our signals show that attackers most commonly used malware, phishing, web applications, and mobile malware in their attempts at network attacks during July 2021. Also in July, there was a significant uptick in the use of coin miners<\/a>, a type of malware that uses the network to mine cryptocurrency. Protocols leveraged most often in attacks were HTTP, TCP, and DNS, since these are open to the internet. A Zero Trust approach<\/a> assumes your network is always under attack; therefore, you need to be prepared with a segmented layout that minimizes the blast radius.<\/p>\n <\/p>\n Figure 3: Top 10 network threats (July 2021).<\/em><\/p>\n Distributed denial of service (DDoS) attacks<\/a> on internet-facing endpoints ramped up significantly this year. Compared to the latter part of 2020, the average daily number of attack mitigations in the first half of 2021 increased by 25 percent while the average attack bandwidth per public IP increased by 30 percent. Microsoft Azure DDoS Protection<\/a> mitigated 1,200 to 1,400 unique DDoS attacks every day in the first half of 2021. Europe, Asia, and the United States remain the most attacked regions because of the concentration of financial services and gaming industries in those regions. Over 96 percent of the attacks were of short duration\u2014less than four hours. To get our latest research on DDoS attacks<\/a>, download the 2021 MDDR<\/a>.<\/p>\n <\/p>\n Figure 4: DDoS attack destination regions.<\/em><\/p>\n Infrastructure\u2014whether on-premises, cloud-based, virtual machines (VMs), containers, or micro-services\u2014represents a critical threat vector. As the move to the cloud enables a more secure hybrid workforce, organizations are also increasing their dependency on cloud storage, requiring effective threat protection, mitigation strategies, and tools to manage access. Azure Defender<\/a> treats data-centric services, such as cloud storage accounts and big data analytics platforms, as part of the security perimeter and provides prioritization and mitigation of threats. We\u2019ve produced a threat matrix for storage<\/a> to help organizations identify gaps in their defenses, with the expectation that the matrix will evolve as more threats are discovered and cloud infrastructures constantly progress toward securing their services.<\/p>\n With the rise of hybrid work, it\u2019s especially important that data remain protected even if it leaves the devices, apps, infrastructure, and networks your organization controls. While classification, labeling, encryption, and data loss prevention remain core data security components, organizations that effectively manage the lifecycle and flow of their sensitive data as part of their business operations make it much easier for data security and compliance teams to reduce exposure and manage risk. Reducing that risk means reevaluating how your organization conducts business with sensitive data to ensure its proper storage, access, flow, and lifecycle.<\/p>\n <\/p>\n Figure 5. The cumulative impact of unified data governance and security on sensitive data risk.<\/em><\/p>\n As we adapt to a hybrid work world, Microsoft is aware of cybersecurity paradigm shifts that will support the evolution of work in a way that centers on the inclusivity of people and data.<\/p>\n By applying empathy to digital solutions, we can make them more inclusive toward people with diverse perspectives and varied abilities. Factoring in digital empathy leads to the inclusion of security professionals with a broader range of abilities, skill sets, and perspectives\u2014increasing the effectiveness of cybersecurity solutions. It also means developing technology that can forgive mistakes. Whether as an organization or an individual, our ability to be empathetic will help us to adapt during this time of constant change.<\/p>\n As we look past the pandemic to a time when workforces and budgets finally rebound, Zero Trust will become the biggest area of investment for cybersecurity. This means that right now, every one of us is on a Zero Trust journey\u2014whether we know it or not. As shown in Figure 2, it doesn\u2019t matter whether you start in endpoints, applications, or infrastructure, all that matters is that you get started now. Something as simple as enabling MFA (free with Microsoft Security solutions) can prevent 99 percent of credential theft. \u00a0To see where you are at in your Zero Trust journey, take the Zero Trust Assessment<\/a>.<\/p>\n Microsoft processes over 24 trillion daily security signals across a diverse set of endpoints, products, services, and feeds from around the globe. We were able to identify and block new COVID-19-themed threats\u2014sometimes in a fraction of a second\u2014before they reached customers. Our rich diversity of data allowed Microsoft cyber defenders to understand COVID-19-themed attacks in a broader context\u2014determining that attackers were primarily adding new pandemic-themed lures to familiar malware. This is just one example of how the diversity of data and the power of the cloud deliver a clear advantage in combating threats.<\/p>\n The latest cyberattacks are deliberately targeting core business systems to maximize destructive impact and increase the likelihood of a ransomware payout. Knowing this, it\u2019s imperative that a comprehensive approach to operational resilience includes cyber-resilience. At Microsoft, our strategy focuses on four basic threat scenarios: events we can plan for, such as extreme weather; unforeseen natural events, such as earthquakes; legal events, such as cyberattacks; and deadly pandemics, such as COVID-19. Cloud technology, due to its scalability and agility, helps organizations develop a comprehensive cyber-resilience strategy and makes preparing for contingencies less complicated.<\/p>\n Recent attacks by nation-state actors against Microsoft Exchange<\/a>, Colonial Pipeline<\/a>, and JBS USA<\/a> brought into stark reality the agility and callousness of our adversaries. To uncover shifting attack techniques and stop them before they do serious damage, organizations need to have complete visibility across their own applications, endpoints, network, and users. To do this, while simplifying and reducing costs, businesses can adopt the security capabilities built into the cloud and productivity platforms<\/a> they\u2019re already using. Security tools that are fully integrated help improve efficacy and provide the end-to-end visibility today\u2019s organization needs.<\/p>\n While digital acceleration will continue to drive these paradigm shifts, one thing remains the same: security technology is about improving productivity and collaboration through secure and inclusive user experiences. By practicing security for all<\/a>, Microsoft is committed to making cybersecurity empowering for your organization every day.<\/p>\n Hybrid work is the new normal, and organizations need the latest data on how to defend themselves in a constantly evolving threat landscape. To get 100 plus pages of insights gathered across more than 23 billion daily security signals across the Microsoft cloud, endpoints, and intelligent edge, download the 2021 Microsoft Digital Defense Report<\/a>. Also, see our past blog posts providing information for each themed week of Cybersecurity Awareness Month 2021. Read our latest posts:<\/p>\n Be sure to visit our Cybersecurity Awareness Month<\/a> page for more resources and information on protecting your organization year-round. Do your part. #BeCyberSmart<\/strong><\/p>\n To learn more about Microsoft Security solutions,\u00a0visit our\u00a0website<\/a>.\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Learn how implementing Zero Trust security can help secure your business in a time of constant change.<\/p>\n","protected":false},"author":106,"featured_media":99609,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3689],"products":[3702,3703],"threat-intelligence":[],"tags":[3824],"coauthors":[2133],"class_list":["post-96906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-zero-trust","products-microsoft-entra","products-microsoft-entra-id","tag-hybrid-work","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-6-1694638266-691","review-flag-7-1694638266-851","review-flag-9-1694638266-118","review-flag-alway-1694638263-571","review-flag-anywh-1694638264-237","review-flag-iot-1694638272-473","review-flag-never-1694638263-791","review-flag-new-1694638263-340","review-flag-partn-1694638263-177","review-flag-percent"],"yoast_head":"\nHybrid work requires a Zero Trust strategy<\/h2>\n
6 pillars for securing your hybrid workforce<\/h2>\n
1. Identities<\/h3>\n
2. Endpoints<\/h3>\n
3. Applications<\/h3>\n
\n
4. Network<\/h3>\n
5. Infrastructure<\/h3>\n
6. Data<\/h3>\n
Actionable insights<\/h2>\n
Practice digital empathy<\/h3>\n
Don\u2019t wait to start your Zero Trust journey<\/h3>\n
Diversity of data sources matters<\/h3>\n
Cyber resilience equals business resilience<\/h3>\n
Focus on integrated security<\/h3>\n
Learn more<\/h2>\n
\n