{"id":1789,"date":"2021-09-08T12:39:00","date_gmt":"2021-09-08T12:39:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1789"},"modified":"2026-02-10T13:45:09","modified_gmt":"2026-02-10T13:45:09","slug":"distributed-work","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/","title":{"rendered":"Distributed Work Is a Cybersecurity Nightmare"},"content":{"rendered":"\n<p>In a survey released in November 2020, cybersecurity management firm Skybox announced that <a href=\"https:\/\/www.skyboxsecurity.com\/news\/distributed-workforce-security-risks-research\/\">73% of security and IT executives are concerned about cybersecurity vulnerabilities created by distributed work<\/a>. That&#8217;s not the concerning part, though. The survey also found that security teams have grown complacent \u2014 even though only 11% can maintain a holistic view of their attack surfaces, 93% of security executives are confident that changes to network and system configurations are correctly validated.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is distributed work a cybersecurity nightmare?<\/h2>\n\n\n\n<p>We all know what happens when overconfidence meets cybersecurity.&nbsp;<\/p>\n\n\n\n<p>It isn&#8217;t as if we have anything to be confident about, either.&nbsp; Per Canalys, <a href=\"https:\/\/www.canalys.com\/newsroom\/cybersecurity-investment-2020\">Cybersecurity investment in 2020 only increased by 10%<\/a>. Worse, that was <em>record-setting and outstripped other segments of IT.&nbsp;<\/em><\/p>\n\n\n\n<p>That wasn&#8217;t the only record we saw broken in 2020, either. The year saw more data breaches and compromised records than in the past <em>15 years combined. <\/em>Much of this, the analyst notes, can be attributed to how rapidly everyone was forced to transition to distributed work.<\/p>\n\n\n\n<p>&#8220;Organizations had to implement business continuity measures quickly in response to the COVID-19 pandemic or face ruin,&#8221; the firm explains in a press release.&nbsp; &#8220;This was often at the expense of cybersecurity and bypassed longstanding corporate policies, leaving many exposed to exploitation by highly organized and sophisticated threat actors, as well as other more opportunistic hackers.&#8221;&nbsp;<\/p>\n\n\n\n<p>So far, 2021 isn&#8217;t much better. In just the past few months, we&#8217;ve seen high-profile breaches that include Microsoft Exchange and Facebook. To be blunt, the pandemic is an absolute <em>nightmare <\/em>from a cybersecurity standpoint.<\/p>\n\n\n\n<p>Security teams are functionally besieged from all sides. While contending with a severe vulnerability in a software platform like Exchange or others, they must also deal with issues like ransomware, malicious insiders, and distributed denial of service attacks. And this is all while <a href=\"https:\/\/any.run\/cybersecurity-blog\/working-remotely-in-cybersecurity\/\">managing a completely distributed workforce,<\/a> one in which many people are using completely insecure networks and devices.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to improve distributed work?<\/h2>\n\n\n\n<p>The good news is that security personnel are <em>not <\/em>helpless in this regard. It is well within their power to address the security shortcomings of remote work and the Internet of Things. Here&#8217;s how.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Revisit your security policies. <\/strong>If you did not revise your plans and processes during the transition to distributed work, they are outdated. And because they are outdated, they are putting your business at risk. You <em>need <\/em>to establish a robust set of guidelines for cybersecurity at home that hits the following beats:\n<ul class=\"wp-block-list\">\n<li>Access policies for corporate systems and data.\u00a0<\/li>\n\n\n\n<li>Acceptable use for corporate-owned devices.\u00a0<\/li>\n\n\n\n<li>The software for secure connectivity between the home and the workplace.\u00a0<\/li>\n\n\n\n<li>Patching\/update requirements for employee devices.\u00a0<\/li>\n\n\n\n<li>Auditing for remote endpoints.\u00a0<\/li>\n\n\n\n<li>A monitoring strategy and process for taking inventory of your assets.\u00a0<\/li>\n\n\n\n<li>Training and compliance.\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/incident-response-and-digital-forensics\/\">Incident response<\/a>.<\/li>\n\n\n\n<li>The process for reporting cybersecurity issues or incidents. You may want to include a policy that <a href=\"https:\/\/any.run\/cybersecurity-blog\/safe-malware-research\/\">protects employees <\/a>from retaliation.\u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Help your employees practice better security. <\/strong>Invest in password management software for your business. Provide employees with advice on improving their cybersecurity at the home office, including networks, such as air gapping IoT endpoints and best practices for browsing the web.\u00a0<\/li>\n\n\n\n<li><strong>Control your data. <\/strong>Don&#8217;t allow sensitive documents to drift out of your line of sight when they&#8217;re shared outside the perimeter. Look into a secure file storage solution that enables you to retain visibility into and control files no matter where and when they&#8217;re shared.\u00a0<\/li>\n\n\n\n<li><strong>Guard your access points. <\/strong>Multi-factor authentication is non-negotiable for remote staff.\u00a0<\/li>\n\n\n\n<li><strong>Manage your endpoints. <\/strong>You might consider using a remote desktop solution, cloud software, or a VPN to connect your users to your network. You could also use endpoint management software to ensure you have an overview of your complete ecosystem, even outside your perimeter. Alternatively, you can (and should) do both.\u00a0<\/li>\n\n\n\n<li><strong>Prioritize accordingly. <\/strong>Cybersecurity can no longer be treated as a secondary consideration. It should be at the forefront of everyone&#8217;s mind in both budgeting and business operations. Criminals are not going to relent, and neither can you.\u00a0<\/li>\n\n\n\n<li><strong>Safeguard against malware. <\/strong>All the security procedures in the world won&#8217;t help if you&#8217;re caught off-guard by malicious software. That&#8217;s where <a href=\"https:\/\/any.run\/\">ANY.RUN<\/a> comes in \u2014 trusted by organizations that include MalwareBytes, McAfee, and IBM, their malware sandbox includes interactive threat analysis, thousands of malware samples, and powerful network mapping and monitoring.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Distributed work is here to stay. And unless you start adjusting your security policies now, it&#8217;s not a question of <em>if <\/em>you&#8217;ll face an incident. It&#8217;s a matter of <em>when.&nbsp;<\/em><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a survey released in November 2020, cybersecurity management firm Skybox announced that 73% of security and IT executives are concerned about cybersecurity vulnerabilities created by distributed work. That&#8217;s not the concerning part, though. The survey also found that security teams have grown complacent \u2014 even though only 11% can maintain a holistic view of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[11],"class_list":["post-1789","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-guest-posts","tag-remote-work"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Distributed Work is a Cybersecurity Nightmare - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity was a challenge before the pandemic. With more people than ever choosing to work from home, it now seems insurmountable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Mullahy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/\"},\"author\":{\"name\":\"Tim Mullahy\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Distributed Work Is a Cybersecurity Nightmare\",\"datePublished\":\"2021-09-08T12:39:00+00:00\",\"dateModified\":\"2026-02-10T13:45:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/\"},\"wordCount\":766,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"remote work\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Guest Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/\",\"name\":\"Distributed Work is a Cybersecurity Nightmare - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-09-08T12:39:00+00:00\",\"dateModified\":\"2026-02-10T13:45:09+00:00\",\"description\":\"Cybersecurity was a challenge before the pandemic. With more people than ever choosing to work from home, it now seems insurmountable.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Distributed Work Is a Cybersecurity Nightmare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Tim Mullahy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/tim-mullahy.jpeg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/tim-mullahy.jpeg\",\"caption\":\"Tim Mullahy\"},\"description\":\"Tim Mullahy is the Executive Vice President and Managing Director at Liberty Center One, a new breed of data center located in Royal Oak, MI. Tim has a demonstrated history of working in the information technology and services industry.\",\"sameAs\":[\"https:\/\/libertycenterone.com\/\"],\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Distributed Work is a Cybersecurity Nightmare - ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity was a challenge before the pandemic. With more people than ever choosing to work from home, it now seems insurmountable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/","twitter_misc":{"Written by":"Tim Mullahy","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/"},"author":{"name":"Tim Mullahy","@id":"https:\/\/any.run\/"},"headline":"Distributed Work Is a Cybersecurity Nightmare","datePublished":"2021-09-08T12:39:00+00:00","dateModified":"2026-02-10T13:45:09+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/"},"wordCount":766,"commentCount":3,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["remote work"],"articleSection":["Cybersecurity Lifehacks","Guest Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/","url":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/","name":"Distributed Work is a Cybersecurity Nightmare - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-09-08T12:39:00+00:00","dateModified":"2026-02-10T13:45:09+00:00","description":"Cybersecurity was a challenge before the pandemic. With more people than ever choosing to work from home, it now seems insurmountable.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/distributed-work\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/distributed-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Distributed Work Is a Cybersecurity Nightmare"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Tim Mullahy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/tim-mullahy.jpeg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/tim-mullahy.jpeg","caption":"Tim Mullahy"},"description":"Tim Mullahy is the Executive Vice President and Managing Director at Liberty Center One, a new breed of data center located in Royal Oak, MI. Tim has a demonstrated history of working in the information technology and services industry.","sameAs":["https:\/\/libertycenterone.com\/"],"url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1789"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1789"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1789\/revisions"}],"predecessor-version":[{"id":18406,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1789\/revisions\/18406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3757"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}