Cyber Magazine October 2024 | Page 130

OPERATIONS
embraced by employees and employers alike , however , it has also introduced significant challenges for endpoint recovery .
“ Remote workers often use a mix of personal and corporate devices , complicating the management and security of endpoints ,” explains Quentyn Taylor , Director of Information Security at Canon EMEA . “ Ensuring that all devices are protected from malicious factors and are recovered efficiently in the event of a breach is more complex when employees are dispersed .”
Many employees use their personal smartphone to read work emails , and many companies even have a bring your own device ( BYOD ) policy . While this gives employers and employees agility to deal with work tasks , it complicates the management and security of endpoints .
This blend of devices adds a layer of complexity to the task of managing and securing an organisation ’ s IT infrastructure .
Personal devices , such as employees ’ own laptops , tablets , or smartphones , may not be equipped with the same security measures or configurations as those provided by the company . This inconsistency poses a challenge for IT departments , as they must ensure that all devices accessing the network are adequately protected against potential threats .
“ Ensuring visibility and control over these diverse and dispersed devices is challenging , especially when many are unmanaged or outdated ,” says Melissa . “ Remote endpoints often operate outside secure corporate networks ,

“Remote workers often use a mix of personal and corporate devices , complicating the management and security of endpoints ”

QUENTYN TAYLOR DIRECTOR OF INFORMATION SECURITY , CANON EMEA
making them more vulnerable to cyber threats and harder to manage . You can ’ t protect what you can ’ t see ,”
Personal devices are also more likely to have varied software and operating systems , adding to the complexity of recovering them efficiently in the event of a breach , especially as employees are dispersed .
This all slows down the speed of recovery , and in the event a large enterprise which employs thousands of employees , can mean the rate of recovery , and subsequent downtime , can take weeks to remediate .
“ Remote and hybrid workers are at greater risk of much longer recovery times . Whether it is just recovering their system or in the worst-case scenario when the majority of the systems have to be recovered at the same time ,” explains Steve Winterfeld , Advisory CISO at Akamai .
130 October 2024