SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news
Partner content
Story image

10 cybersecurity risks to consider when transitioning back to the office

By Nick Forrester
Tue 11 Aug 2020
FYI, this story is more than a year old

COVID-19 has overhauled several aspects of societies across the world – economies are struggling, dependence on online and zero-touch systems are at an all-time high, and the rug has been pulled out from under traditional working and learning environments, abruptly shifting them from offices and classrooms into makeshift living room offices and studies.

This was the reality for most in the months directly following the global outbreak of the pandemic, and several countries, like New Zealand, Taiwan and South Korea, have largely returned to normal. 

But, just as moving the work environment into the home was abrupt, so too was the move back into the office after ‘returning to normal’ – and in some cases, this process hasn’t been as smooth as planned.

And now, with regions within countries that have suffered new outbreaks, like Victoria in Australia, it’s more imperative than ever that organisations know the key strategies and methods that need to be considered to reopen societies and businesses. 

According to BSI, working from home (WFH) and working from office (WFO) scenarios should be applied by organisations interchangeably when reopening, with an aim to mitigate potential cybersecurity risks and ensure data privacy regulations are not violated.

“The last few months have tested many organisations of all shapes and sizes across the globe,” says BSI global practice director for cyber, risk and advisory Stephen O’Boyle.

“Many needed to adapt quickly to the restrictions to ensure the safety and wellbeing of their employees and clients, with remote working being activated, and IT systems tested and reconfigured to remain effective.”

“While there were many challenges, including the increase in cyber threats and risks, and data privacy concerns, it also provided organisations with the opportunity to customise, review, update and improve their response planning and enhance their business continuity plans to prepare for the phased reopening.”

But how do organisations go about this?

Here are the 10 areas regarding cybersecurity and data governance that businesses should consider before reopening.

Physical security 

This is where zero-touch solutions and direct contact mitigation strategies should come into play. 

Pin pads or biometric security systems could be reassessed, and contact tracing technology may become necessary depending on privacy regulations and the extent of community infections.

Security protocols may also change in accordance with recommended standards for sanitisation and hygiene.

Data protection and privacy

In the report, BSI urges employers to consider whether there is a legal basis to process more personal data of employees in the interests of preventing COVID-19 infection. This can include being mindful of how to handle data gleaned from onsite health or temperature checks, for example.

Many organisations may find they are in possession of private employee health data that they previously would not have collected – meaning extra steps should be taken to safeguard this information in line with privacy regulations.

Organisations should also consider the impact and consequences of employees electing not to give explicit consent for employers to process this data.

Asset management 

Before reopening, organisations should review their data, hardware and software, facilities management and staff requirements. All of these are subject to change throughout the WFH process, and should be carefully analysed to ensure health and proper functionality. 

Many organisations turned to bring your own device (BYOD) policies during lockdowns – this policy should be re-evaluated, and ensure all non-inventoried assets are correctly logged.

Access control

Multi-factor authentication was an essential part of many WFH security strategies, and this policy should be kept in place, the BSI report suggests.

Many organisations may have migrated systems online to help with remote access while staff worked from home. These systems should be assessed for security health through configuration review, scanning and penetration testing.

Network security 

Remote access capabilities and solutions, like remote desktop protocols (RDPs) and VPNs should also be kept in place, in case new COVID-19 cases emerge in the region. 

This means RDPs, which is vulnerable to password theft and server exploitation, must be reviewed as they are a primary attack vector. 

Many organisations have enabled a ‘split tunnel’ function on their VPN to allow some sites to avoid centralised proxy inspection to save bandwidth. The BSI report encourages these organisations to re-evaluate whether this is the right approach, particularly if all web traffic was sent to a local internet break out, as opposed to being proxied.

Operations security

Configurations set up for remote working should be reviewed, like a setup where anti-malware updates were sent to a remote device rather than a centrally managed on-premises server.

Bandwidth capacity will change when employees return from WFH scenarios. Revaluating an organisation’s capacity demand, in a self-provisioning cloud ecosystem, could support cost saving efforts.

Vulnerability management

Changing from a WFH environment to a WFO environment, or vice versa, can necessitate new systems being added to the network. Organisations should ensure that these new systems are added to a regular vulnerability scanning schedule, and penetration tested by cybersecurity experts.

Patch posture should also be analysed, especially as patch management has a reputation of being an afterthought in the best of times. 

Business continuity

In many cases, business continuity was placed at the heart of an organisation’s strategy to tackle the upheaval caused by COVID-19.

The pandemic, despite its myriad negative consequences, allowed businesses to test their readiness to adapt to abrupt and far-reaching shifts in working environments. 

Organisations in regions that are ‘returning to normal’ should take the opportunity to review their performance throughout the great shift to remote working, analysing where they did well and where improvement can be made in the event of reinfection in the region.

Incident management

The pandemic has increased most organisations’ vulnerability to cyber-attack at least somewhat, with some industries suffering more than others. Phishing, malware and ransomware all saw boosts in penetration and success, with advanced persistent threat (APT) groups faring particularly well in the healthcare industry in their efforts to steal data.

Incident response playbooks should be reviewed in light of this increased vulnerability, with new training scenarios implemented to prepare staff for specific attacks seen in recent months.

Security governance

“Security governance is the set of practices exercised by cybersecurity teams with the aim of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately,” according to the BSI report.

In the wake of the security headaches suffered as a result of the pandemic, organisations should ensure their security governance is in line with wider business objectives.

Security governance should be considered in tandem with both risk management and physical security precautions – which, in turn, can provide better protection for their cybersecurity, data governance, privacy management and staff.

“The focus now is on opening safely and a top priority is an organization’s cybersecurity and data governance needs,” continues Stephen O’Boyle.

“Those responsible for it need to be part of the planning process. Not only will this ensure that the correct protocols are adhered too and implemented, it will enable a business to operate in a more secure, safe, sustainable, trusted, and resilient manner, protecting its people, information and reputation.”

Related stories
Top stories
Story image
Ransomware
Examining the future of ransomware threats with Vectra’s CTO
As customers' valuable data move to the cloud, so will ransomware. What is the current landscape and what do we need to know?
Story image
Apple
Your tools, your choice: why allow employees to choose their own devices?
Jamf Australia says giving your team the freedom to work with their digital device of choice could help to attract and retain top talent in a tight labour market.
Story image
Security Information and Event Management (SIEM)
LogRhythm updates SIEM Platform with latest innovations
LogRhythm has announced the launch of version 7.9 of the LogRhythm SIEM Platform and updates to LogRhythm NDR and LogRhythm UEBA.
Story image
Document Management
NZ's FileInvite raises $10M in latest investment round
FileInvite has raised $10 million in Series A investment to fast-forward the extinction of email for requesting and collecting documents online.
Story image
WatchGuard Technologies
Ransomware volume doubled 2021 total by end of Q1 2022
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to a new report. 
Story image
Compliance
SentinelOne integrates with Torq to empower security teams
"With Torq, security teams can extend the power of SentinelOne to systems across the organisation to benefit from a proactive security posture.”
Story image
Ransomware
Secureworks reveals new information on BRONZE STARLIGHT threat group
New research from Secureworks has uncovered new information on the Chinese threat group BRONZE STARLIGHT and how they are using targeted ransomware to initiate complicated attacks.
Story image
SaaS
Ping Identity appoints Deloitte Australia as a partner
Ping Identity has appointed Deloitte Australia as a Consulting Technology Partner, uniting its offerings with the company's consulting services.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
PwC
WSLHD and PwC’s Consulting Business came together to solve through the challenges of COVID-19. A model of care was developed to the NSW Health Agency for Clinical Innovation guidelines with new technology platforms and an entirely new workforce.
Link image
Story image
Payroll
How New South Wales state departments achieved cloud migration success
State departments in New South Wales are heading to the cloud to achieve better workflow solutions, and one company is paving the way for their success.
Story image
Gartner
Gartner's top recommendations for security leaders
"Leaders now recognise that major disruption is only one crisis away. We can’t control it, but we can evolve our thinking, philosophy, program and architecture.”
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
Internet of Things
ManageEngine wins big in IDC MarketScape assessment
ManageEngine's Endpoint Central service has been recognised as a leader by IDC MarketScape in several categories including Internet of Things device deployments and UEM software for SMEs.
Story image
Enterprise Resource Planning / ERP
Five ways your ERP is letting you down and why it's time for a change
Wiise explains while moving to a new system may seem daunting, the truth is that legacy systems could be holding your business back.
Story image
Cloudera
Overcoming hybrid and multi-cloud challenges to drive innovation
Driven by improvements in technology, financial services companies have advanced both internal and external systems and processes, with the likes of digitisation, personalisation and risk management redefining the industry.
Story image
Artificial Intelligence
Juniper study reveals top AI trends in APAC region
Juniper's research shows an increase in enterprise artificial intelligence adoption over the last 12 months is yielding tangible benefits to organisations.
Story image
Cybersecurity
Zscaler launches co-located data centres in Canberra and Auckland
The investment will offer public and private sector enterprises greater resilience in support of their zero trust cybersecurity posture.
Story image
Cybersecurity
Vulnerable APIs costing businesses billions every year
Large companies are particularly vulnerable to the security risks associated with exposed or unprotected APIs as they accelerate digital transformation.  
Story image
Document Management
Regaining digital trust and enhancing digitisation in Australian Government agencies
Having a digitised ecosystem of documents, tools and data can help bolster security, improve workflow and ultimately create better services.
Story image
Oracle Cloud
Commvault, Oracle to deliver Metallic Data Management as a Service
"We are excited to partner with Commvault and enable our customers to restore and recover their most mission-critical cloud data."
Story image
Cybersecurity
Video: 10 Minute IT Jams - An update from CrowdStrike
Scott Jarkoff joins us today to discuss current trends in the cyber threat landscape, and the reporting work CrowdStrike is doing to prevent further cyber harm.
Story image
Documentation
Adobe study finds lack of digital trust and utilisation in Australian Government agencies
New research commissioned by Adobe has revealed a significant lack of digital trust within Australian Government departments, along with the continued underutilisation of key digital processes.
Story image
MSP
Video: 10 Minute IT Jams - An update from CyberArk
Olly Stimpson joins us today to discuss the importance of MSP programmes and how MSP partners are experiencing success with CyberArk.
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
Story image
Ransomware
Businesses unprepared to defend against ransomware attacks
Ransomware attacks continue to impact organisations worldwide with high costs, but businesses are still largely unprepared.
Story image
Malware
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
Training
Barracuda customises training to fit ACSC Essential Eight
Barracuda has announced that its Security Awareness Training now provides a customised training curriculum in line with the Australian Cyber Security Centre’s (ACSC) Essential Eight.
Story image
Media
Registrations for the W.Media Sydney Cloud and Datacenter Convention 2022 now open
Are you a C-Level executive looking to enhance your knowledge in the cloud and data center space in order to get the best results for your company?
Story image
State Library of Victoria
State Library of Victoria entrusts Oracle support and security to Rimini Street
“Our finance team are very happy with the support and security that Rimini Street provides, which keeps our assets and our customers secure."
Story image
Solutions
Progress launches latest version of network visibility solution
In Flowmon 12 network solution, Progress has expanded its support for public cloud provider flow log monitoring and launched new features.
Story image
Cybersecurity
Security driving customer identity & access management adoption
"CIAM allows businesses to embed a secure identity layer into their consumer and SaaS applications, facilitating secure, seamless end user experiences."
Story image
Research
New study reveals 51% of employees using unauthorised apps
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
Story image
Cyber Criminal
Identity and access: the fight is on
Blue team defenders are used to protecting our data, applications, and users with access controls and other security mechanisms, which is why attacks like this are especially challenging when they target identity and access control systems.
PwC
PwC's Consulting Business and PwC's Indigenous Consulting are proud to play an important role in helping Australian Indigenous Mentoring Experience build IMAGI-NATION, a free online university for marginalised communities around the world.
Link image
Story image
Cybersecurity
Email threats spike 101%, remains a top attack vector
"Each year we see innovation in the threat landscape, but each year email remains a major threat to organisations."
Story image
Cybersecurity
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Digital Fingerprint
Decline in counterfeit cherries after digital fingerprinting
Reid Fruits says there’s been a dramatic decline in counterfeit products for its cherries over the past three export seasons to Asia because of digital fingerprinting.
Story image
Compliance
Stock security features inadequate in face of rising risk
"Organisations must proactively find ways of identifying unseen vulnerabilities and should take a diligent, holistic approach to cybersecurity."
Story image
Apple
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
Cybersecurity
How organisations can mitigate IoT and IIoT security risks
IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured, putting organisations in danger of cyber threats. Here are tips on how to mitigate those risks.
Story image
Cybersecurity
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
Trend Micro
5G network projects driven by improving security and privacy
Trend Micro's new study reveals the prospect of improved security and privacy capabilities are the main motivations behind private 5G wireless network projects.