Exploiting the Distributed Workforce Economy – A Hacker’s Perspective

How hackers can exploit a hastily distributed workforce
 

Bring-your-own-device (BYOD) and remote workers have presented challenges for IT operations and security teams for decades. The pandemic exacerbated these challenges exponentially by forcing organizations to hastily transition to a fully work-from-home (WFH) environment. But what’s a nightmare for IT teams is a dream for cyber criminals and adversaries.

With most organizations moving to an almost 100% distributed workforce overnight – a process that may have been on the long-term horizon, to be completed over multiple years and at a much smaller scale – existing gaps in endpoint management and security were widened, opening many doors for adversaries to exploit the situation.

Download this white paper by former hacker Alissa Knight with Knight Ink where she offers her unique perspective on:

  • The broad attack surface created by the hastily distributed workforce
  • Adversarial tactics and techniques that can be used to exploit the remote employees
  • How proper IT hygiene and collaboration between IT ops and security teams could have prevented many aspects of the current nightmare


We use cookies to optimize your experience, enhance site navigation, analyze site usage, assist in our marketing efforts. Privacy Policy