Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»Features»Cybersecurity Awareness Month: Security measures refresher for businesses in a hybrid world
    Features

    Cybersecurity Awareness Month: Security measures refresher for businesses in a hybrid world

    Brand SpotBy Brand SpotNovember 1, 20235 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    Zoho
    Zoho
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    With hybrid work becoming popular and new tech like AI depending on data mining, there are growing concerns amongst many businesses regarding cybersecurity. As Cybersecurity Awareness Month draws to a close, Veerakumar Natarajan, Country Head, Zoho Kenya shares some thoughts on technical security, privacy measures for businesses, and the importance of Zero Trust model.

    Kenya is now the third-most targeted country by cyber criminals in Africa, after Nigeria and South Africa, according to The Communications Authority of Kenya (CA). In a report released at the beginning of October, the regulator said the frequency, sophistication and scale of cyber threats targeted at Kenya’s critical information infrastructure had increased dramatically. The country, according to the regulator, experienced a record 860 million cyberattacks in the last one year and 79% of the attacks were caused by cyber criminals infiltrating the computer systems of organisations.

    Given that a number of businesses are now embracing the largely perimeter-less hybrid work model, organisations need to plan their long-term security strategy to support the new ‘work-from-anywhere’ environment. Adoption of new technology like AI, also poses privacy and security risks.

    Security concerns with hybrid work models

    In a hybrid work culture, an employee may log in from multiple locations outside of the office during a given week when they work remotely. In the home or remote environment, work and personal tasks are often commingled in one machine, corporate devices are used for personal projects, and work is done over home internet service providers.

    This can lead to cases like unapproved software installations, installations of vulnerable browser extensions, and browsing malicious sites on corporate devices. Moreover, employees might fail to consider company security policies and could inadvertently disable security controls, exposing their device to vulnerabilities and threats. A company’s entire network is at the risk of compromise if such a device connects to the corporate network.

    With data turning into a prevalent commodity in today’s digital world, privacy issues are a rising concern. It’s essential to comprehend these threats to make informed and safe decisions. Privacy issues include challenges related to protecting personal and sensitive data from unauthorised access, manipulation, and misuse. The most typical threats include phishing and social engineering, personal or card data theft or misuse, malware, and hacking.

    These challenges span across multiple domains, from social networking to online banking, and the increasing reliance on digital infrastructure only makes companies more susceptible to cyber threats. This raises the question of how businesses can protect their resources.

    The initial step for an enterprise, regardless of their size, is to look at covering the following basics:

    • Setup asset management: You can’t protect what you don’t know, so it’s critical to maintain a self-updating list of deployed assets in your organisation’s network.
    • Strengthen remote access management: This includes using Virtual Private Networks (VPNs); however, they do not offer sufficient security. A robust remote monitoring and management system will help the IT department to enable employees to access sensitive data and files in a secure manner.
    • Deploy endpoint security: Endpoint security applications help organisations protect devices like laptops and mobiles from cyberattacks. These need to be regularly updated.
    • Adopt multi-factor authentication: This is one of the easiest steps to take. There are multiple tools available in the market, such as Zoho OneAuth that can help enable this.
    • Raise employee awareness within the organisation: The security of an organisation is only as good as the least security-conscious employee. Many cyberattacks happen through social engineering, which plays on the vulnerability of employees. Therefore, regular workshops and education on privacy and security are vital for a business.

    When evaluating security solutions, businesses should consider factors like easy adoption, accuracy and lesser false positives, automated response provisions, limited administration, and intuitive features that are also simple to manage.

    On the security operations front, the sheer volume of attempted attacks is increasing to such a point that it is impossible for human analysts to examine them all to identify real and serious threats. So, there should be focus on process automation to free up some of the security team’s time to concentrate on higher level analysis. This is where Zero Trust fits in.

    Importance of Zero Trust models for modern businesses

    Zero trust is a modern security strategy based on the principle: never trust, always verify. Instead of assuming that everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network.

    Zero trust architecture is well-suited for a hybrid work environment as it delivers solid access controls and context-based perimeter security. This helps enable a seamless experience for employees through multi-factor authentication and continuous authentication of the users and devices on a network, regardless of where they are located.

    Adopting a Zero Trust strategy is no longer an option, it’s a business imperative to remain secure in a hybrid future.

    Now Read: Zoho’s user base Crosses the 100 Million Mark

    zoho
    Brand Spot
    • Website
    • Facebook
    • X (Twitter)
    • Instagram
    • LinkedIn

    Brand Spot by Techarena allows companies to share their stories directly with TechArena's audience. To promote your brand and get featured, email [email protected]

    Related Posts

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    Change leaders must put security at the heart of transformation

    October 13, 2025

    Westcon-Comstor’s Vincent Entonu: “Africa Is Not a Late Adopter of Technology”

    October 10, 2025

    Comments are closed.

    Latest Posts

    GITEX 2025: Software Group and ELM Sign MoU to Advance Digital Financial Infrastructure

    October 16, 2025

    Jahazii Raises $400,000 in Pre-Seed Funding

    October 15, 2025

    Paradigm Tower Ventures Debuts with IHS Rwanda Acquisition

    October 15, 2025

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    October 15, 2025
    Advertisement
    Editor's Pick

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    Change leaders must put security at the heart of transformation

    October 13, 2025

    Westcon-Comstor’s Vincent Entonu: “Africa Is Not a Late Adopter of Technology”

    October 10, 2025

    What You Need to Know About Safaricom’s New VybCall Feature

    October 8, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.