The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?

Kelly Sheridan, Former Senior Editor, Dark Reading

October 20, 2020

9 Min Read

This year has put IT and security teams to the test as organizations quickly transitioned to a fully remote workforce to stop the spread of COVID-19. What started as a hasty response to a global emergency has evolved into reassessing endpoint security strategies as businesses plan for 2021.

Remote work became a necessity in 2020, forcing employees out of conventional workplaces and into home offices. Connectivity was the priority, and people logged on from personal laptops, phones, and home networks – whatever was necessary to keep operations running.

"The immediate response was, whatever worked," says Wendy Nather, head advisory CISO for Cisco's Duo Security. "The emphasis was on availability over just about everything else; on the continuity of business operations."

Such was the case at Siemens USA, which has an ecosystem of some 400,000 employees across energy, healthcare, and other critical sectors. Because its workforce was already distributed, the company had measures in place to enable remote work without any major changes to security or infrastructure. Even so, its IT team had to scale quickly to accommodate this broad shift, and its cybersecurity team had to "zero in on its top priorities," says CISO Kurt John.

First and foremost was balancing business continuity with security, he continues. This was key in a business such as Siemens, where so many employees are essential for keeping the lights on in hospitals, power stations, water treatment plants, and other critical infrastructure. Its security team had to decide which factors were non-negotiable, and where it could be flexible. 

Security updates were a non-negotiable, says John. One of the steps Siemens USA took was eliminating the need for employees to be on a VPN in order to receive software updates. Endpoint detection and response (EDR) solutions were another non-negotiable, he continues. 

"It's already painful working from home, but you definitely don't want to make it much more painful, not just for that person but for everyone else – IT, the business, cybersecurity – by having malware that could potentially spread throughout the organization," John explains.

Like John, security leaders around the world faced unprecedented challenges as employees swapped their offices and desktop machines for personal devices and home networks, driving an increase in security risk and prompting infosec teams to rethink their long-term strategies. 

Newly Remote Workforce Creates Endpoint Threats

The overnight shift to remote work introduced a wave of new enterprise security threats.

One of the biggest issues detected when the shift began was the breakdown of third-party supply chains, says Nather. Most businesses were used to supporting at least some remote employees; in these few cases, they would order the equipment needed and send it home.

"But this was a wave of everybody needing the same equipment, and the same access, at one time," she continues. "Because of supply chain problems … a lot of them had to say, 'just use whatever you have at home,' and that was a sudden, sharp shock of BYOD."

Once businesses figured out access, they had to turn their focus to endpoint security problems. Security teams could no longer rely on vulnerability scanners typically used in office networks, as this traffic looks like an attack to a residential Internet service provider (ISP). This makes it more difficult to detect security threats that could put sensitive corporate information at risk.

"That's another example of centralized security models that are falling apart," she says. "We have to come up with a better way of monitoring and enforcing endpoint security, especially if the employee says, 'This is my personal laptop and I don't want to put an agent on it.'"

The use of technologies blurred as people worked from home. Employees were using company-owned laptops on home wifi networks; their personal smartphones to access business data. All the while, cybercriminals launched waves of relentless attacks against remote workers.

John calls it a "perfect storm of spamming." Siemens' cyber defense center processes about two billion events per day globally; its team has seen an uptick in social engineering and spam in the pandemic. Combined with events such as the 2020 election and new criminal tactics such as vishing and deepfakes, "it really makes for a tricky environment for CISOs to navigate," he adds.

"As we've watched what's happened with attacks over the years, there's not a lot of difference in the attacks themselves, and the doors through which bad guys go to get into systems," says Jeff Wilbur, senior director of online trust at the Internet Society. Many of the attacks he has seen in the pandemic, such as phishing campaigns, are after typical goals like credential theft.

Businesses are worried about their lack of visibility into the devices employees are working on. "There's also this potential risk that gets introduced because of lack of control," Wilbur adds. A large percentage of home devices are used by multiple family members, increasing the chance that someone could download malware onto a machine used to handle enterprise information.

Remote Work Is Here to Stay: The Challenges

The initial shift to remote work may have seemed temporary, but companies are now realizing they'll have to factor the change into their long-term plans.

Siemens USA employees will be remote based on locality and the corresponding regulations for towns and states, says John. This aside, employees who can work from home will have the option to do so for 2-3 days per week. Cisco, which is also already remote friendly, is planning for all US employees to remain remote through the end of the year.

Many CISOs are planning to support a "hybrid model" in which people can choose whether they work at home or at the office, says Nather. It's expected many employees will want to continue working remotely; there will be others who want to switch between the office and home. An IBM survey of 25,000 people found 54% would like remote work to be their primary way of working; 75% would like to continue working remotely "at least occasionally."

"Enterprises should plan to support mostly remote workforces into 2021," says Eric Parizo, senior analyst with Omdia, who notes it's unclear in many places when the spread of COVID-19 will allow for a safe return to offices.

However, remote work requires different security controls. "Traditional network security infrastructures, which often include firewalls, intrusion prevention, network traffic analysis, Web filtering, and others, often cannot easily be extended to remote workforces," he continues. An organization can use VPN access to use those controls to safeguard remote workers, but this requires traffic backhauling, which is pricey, inefficient, and often causes latency, Parizo adds.

Businesses have realized they can't create a traditional network perimeter for remote devices connecting to corporate access through untrusted networks. Further, they don't have the same control over remote endpoints that aren't on their network; devices they don't even own. This is driving the demand for security-as-a-service and zero-trust access.

There is discussion around what kind of presence the company should have on an employee's endpoint, says Nather. Security teams have relied on network traffic monitoring to catch what they weren't seeing on endpoints; now, with less ability to monitor network traffic and more people moving to the cloud, "there's a lot of stuff they can't see," she says. CISOs are trying to balance their monitoring strategy between endpoint and network.

"Flexibility and adaptability will definitely be the name of the game for 2021, or at least until we have true clarity about how we will be getting out of this pandemic," says Omdia analyst Rik Turner. His impression is that companies expect 2021 revenue to fall short of pre-pandemic forecasts and are trying to find an endpoint security strategy flexible enough to support this. 

Endpoint Technology: What CISOs Are Prioritizing

Distributed security is top of mind for John, who is prioritizing zero-trust going into next year.

"Having [remote work] now be our new normal, obviously we need to accelerate the concept of zero trust; in other words, particular technologies that can help democratize security throughout the infrastructure … rather than this one-and-done, VPN-type, castle-and-moat approach," he says.

Both Turner and Parizo foresee the emergence of extended detection and response tools, which combine endpoint, network, and cloud, and are often supported by managed security services. Businesses need visibility and control across the full IT estate, whether that's on the corporate network, in a hybrid data center, or on the remote employee's endpoint. 

"I'm not, of course, saying that the VPN market for remote access will shrivel and die overnight," says Turner of demand for technologies like secure access service edge (SASE). "Enterprises have too much invested in it for that to happen, but I do see growth in the [zero-trust access] market alongside it, as ever more applications reside in the cloud and people work from home."

Many CISOs wish they had implemented SASE before now, says Nather, and this will be a top priority going into 2021. This move goes along with sustainability: secure access through the cloud will work better for everyone, she points out, and CISOs want to build it out right.

Security leaders are interested in passwordless security, which many have wanted to install but haven't had the bandwidth. Now, as they realize how the pandemic has affected employees' user experience, they're thinking of how to improve. Even if they can't adopt passwordless tech, they're refining the user access experience. This could mean increasing single sign-on, switching the authentication factors employees use, or changing how employees authenticate. 

"Tweaking those settings to try to make things better and smoother for their users is something that's going on, even if they're not ready to start tackling new technologies," Nather adds.

Several CISOs, instead of buying new tech, are using this time as an opportunity to take an asset inventory. In all the confusion, many aren't sure which assets belong to the company and which are being used by employees, or the amount of technical debt they have accrued. Many have realized their multiplicity of security tools and are thinking about which they should keep.

"Some of it is clean-up from the beginning of the year, some of it is taking time to catch up," says Nather. Technical debt tends to accrue when a company is in high-growth mode. At a time like this, when growth is affected, it's a good time to switch to maintenance mode.  

About the Author(s)

Kelly Sheridan

Former Senior Editor, Dark Reading

Kelly Sheridan was formerly a Staff Editor at Dark Reading, where she focused on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial services. Sheridan earned her BA in English at Villanova University. You can follow her on Twitter @kellymsheridan.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights