Among other problems, she highlighted the following

Where business professionals discuss big database and data management.
Post Reply
rakhirhif8963
Posts: 533
Joined: Mon Dec 23, 2024 3:11 am

Among other problems, she highlighted the following

Post by rakhirhif8963 »

She says companies are facing “device degradation,” which occurs when a device is missing app updates or an employee has reconfigured it for use on a home network. Some devices contain a mix of work and personal content. “This can result in different levels of compliance and risk for different employees and organizations, but you still need to be able to detect, assess the damage, and remediate a device before it can undermine your entire enterprise security posture,” Sundra says. “It only takes one problematic computer to introduce ransomware or other risks into a resurgent office network, leaving administrators with the unplanned work of checking a large number of devices that are being returned to the corporate home.”


still-active credentials based on a year-old history that nonetheless allow automatic connection to the network. Instead, administrators need to enable Zero Trust protection;
Physical access control systems, such as connected macedonia mobile database as and badge scanners, have software vulnerabilities, poor network segmentation, or other risk factors, making them the most at-risk types of devices in a return-to-office scenario. To mitigate the risks, companies should update their firmware and thoroughly test them before they become mission-critical devices again and handle or process large volumes of traffic.
The entire stack of business applications and third-party services may have changed as teams and departments rebuilt their workflows and productivity levels during the lockdown. Enterprises should re-evaluate their investments in security and processes to ensure there are no blind spots or investments in tools with diminishing returns.
There is a risk of theft or physical interference with devices because employees are accustomed to leaving them around while working from home. They should be reminded to maintain a clean work area and follow safety protocols;
Another risk is related to asset inventory. If it produces inaccurate data, the organization has no information about the extent of its attack surface.
Post Reply