TLDR: Remote work has become a permanent fixture in many organizations, leading to an expanded attack surface and increased cybersecurity threats. The cost of cybercrime is estimated to reach $10.5 trillion by 2025. The top attack surface exposures include web framework takeover, remote access services, and cloud misconfigurations. To mitigate these risks, organizations should prioritize vulnerability management, implement strong authentication methods, maintain continuous visibility into assets, address cloud misconfigurations, and respond quickly to threats.
According to Palo Alto Networks’ 2023 Unit 42 Attack Surface Threat Management report, the top attack surface exposures in hybrid work environments are actions taken on a compromised device and unauthorized access on a compromised attack surface asset. Cloud is a popular attack surface through which exposures are accessed. The report identifies web framework takeover and remote access service exposures as the most prevalent. Over 85% of organizations have remote desktop protocols accessible via the internet, leaving them vulnerable to ransomware attacks. Critical infrastructure sectors, including healthcare, utilities and energy, and state/national governments, are increasingly targeted by threat actors. High-tech companies also face significant risks due to their reliance on remote access services.
The article provides several recommendations for organizations to limit their remote access exposure and improve their security posture, including:
– Changing the vulnerability mindset to identify legacy vulnerability management systems
– Implementing strong authentication methods, such as multi-factor authentication
– Maintaining continuous visibility into on-premises and cloud assets
– Addressing cloud misconfigurations and following industry best practices
– Responding quickly to threats and leveraging attack surface management tools
Overall, the article emphasizes the importance of proactive and holistic approaches to managing remote access exposures in hybrid work environments. By implementing recommended security practices, organizations can mitigate cybersecurity risks and protect their infrastructure.