{"id":34488,"date":"2020-04-18T03:00:00","date_gmt":"2020-04-18T03:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/"},"modified":"2020-04-18T03:00:00","modified_gmt":"2020-04-18T03:00:00","slug":"update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/","title":{"rendered":"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce"},"content":{"rendered":"<p><em>As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.&nbsp; What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.&nbsp; Check back frequently!<\/em><\/p>\n<p><strong>UPDATE 4.17<\/strong><\/p>\n<p><strong>AT&amp;T reported<\/strong> that Email traffic is down 25% as more people opt for phone and video calls.&nbsp; Video conferencing is on the rise with more than 470k Webex Meeting Calls on April 9, the highest during the COVID-19 pandemic.&nbsp; It also stated instant messaging, including text traffic from messaging apps and platforms, has slightly declined since the week prior, but overall is up nearly 60%.<\/p>\n<aside id=\"fsb-2545\" class=\"fakesidebar fakesidebar-auto\"><a href=\"https:\/\/www.networkworld.com\/article\/3189176\/security\/face-off-cisco-vs-fortinet-for-enterprise-firewalls.html\">RELATED: Firewall face-off for the enterprise<\/a><\/aside>\n<p><strong>For the second straight week<\/strong>, Verizon reported that data usage is basically flat or down slightly week-over-week \u2014 including gaming, streaming video, virtual private network (VPN) connections, web browsing and social media \u2014 indicating people have settled into their new routines.<\/p>\n<p><strong>Internet performance<\/strong> across the top 200 cities continued to improve through April 15, according to BroadbandNow.&nbsp; The company reported 91 (45.5%) cities have seen download speed decreases, down from 97 (48.5%) last week. 135 cities (67.5%) have experienced upload speed decreases, which is once again down from last week\u2019s total of 139 (69%).&nbsp; Only two cities have experienced significant download speed decreases of greater than 40% out of range this week: Evansville, Indiana and Saint Paul, Minnesota.<\/p>\n<p><strong>Ookla reported<\/strong> that as of April 15 the U.S. has seen a very slight increase in mean download speed over mobile and fixed broadband when comparing the week of April 6 to the week prior. Specifically mean download speed over fixed broadband increased very slightly in King County, Washington during the week of April 6 while mobile download speed was relatively flat when compared with the week before. San Francisco County, California saw an increase in mean download speed over fixed broadband during the week of April 6, while mobile download speed remained flat. Westchester County, New York saw a decrease in mean download speed over fixed broadband when comparing the week of April 6 to the week before. Mobile download speed increased during the same period.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<h2>&nbsp;<\/h2>\n<h2>UPDATE 4.10<\/h2>\n<p><strong>Verizon Wireless cell-network data<\/strong> indicates how well its customers in the U.S. are staying put during the coronavirus pandemic, with some regions of the country doing far better than others.<\/p>\n<aside id=\"fsb-3065\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\">\n<aside class=\"nativo-promo\">\n<div class=\"excerpt-img bugblog ntv-preview-img-wrapper\" id=\"ntvImageBox\"><img alt=\"ITAAS and Corporate Storage Strategy\" title=\"ITAAS and Corporate Storage Strategy\" data-original=\" https:\/\/images.idgesg.net\/images\/article\/2019\/09\/hpe_nww_post3-100811447-medium.3x2.jpg\" class=\"lazy\" loading=\"lazy\"><\/div>\n<div class=\"excerpt-text\">\n<p class=\"post-meta\"><span class=\"sponsored-blog\">BrandPost<\/span> <span class=\"post-byline\">Sponsored by HPE<\/span><\/p>\n<p class=\"crawl-headline\"><a href=\"https:\/\/www.networkworld.com\/blog\/itaas-and-the-corporate-storage-technology\/?utm_source=IDG&amp;utm_medium=promotions&amp;utm_campaign=HPE22140&amp;utm_content=sidebar\" title=\"ITAAS and Corporate Storage Strategy\" target=\"_blank\" rel=\"noopener noreferrer\">ITAAS and Corporate Storage Strategy<\/a><\/p>\n<p class=\"crawl-summary\">Pay-per-use IT models, such as ITaaS, could be the next chapter in IT infrastructure.<\/p>\n<\/div>\n<\/aside>\n<\/aside>\n<p>The carrier sees a general decline in the number of cell-site handoffs that take place when data sessions move from one tower to another as people move around.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p>According to the latest Verizon Network Report, handoffs have decreased by 35% nationally compared to a typical day before stay-at-home mandates and down 6% from what was reported last week.<\/p>\n<p>Verizon said its New York metro and upstate markets showed the biggest declines at 51% and 61% respectively. Handoff declines for other Verizon markets:<\/p>\n<ul>\n<li>New England: 41%<\/li>\n<li>Northern and Southern California: 41%<\/li>\n<li>Mid-Atlantic\/Greater Washington, D.C. metro area: 39%<\/li>\n<li>Georgia\/Alabama: 18%<\/li>\n<li>The Carolinas\/Tennessee: 16%<\/li>\n<li>Florida: 10%<\/li>\n<li>Gulf Coast: 9%<\/li>\n<\/ul>\n<p><strong>AT&amp;T reports<\/strong> that its core network traffic &#8212; which includes our business, home broadband and wireless usage &#8212; was up 24% through April 7 compared to a similar day in February.&nbsp; Wireless voice minutes of use were up 23% compared to an average Tuesday (April 7) and consumer home voice calling minutes of use were up 33% from an average Tuesday. Wi-Fi calling minutes of use were up 80% from an average Tuesday, AT&amp;T stated.&nbsp;<\/p>\n<p><strong>BroadbandNow reports<\/strong> that Internet performance in the U.S. is improving, with 97 cities (48.5%) recording download-speed degradations this week (down from 117, or 59% last week \u2013 through April 8). In addition 139 cities (69%) have reported upload speed disruptions, which is also down from last week\u2019s 144, or 72%, according to <a href=\"https:\/\/broadbandnow.com\/report\/internet-speed-analysis-march-29th-april-4th\/\" rel=\"nofollow\">BroadbandNow<\/a> monitoring.&nbsp; Three cities are experiencing upload speed drops of greater than 40%, including Baltimore, Maryland, Los Angeles, California, and Flushing, New York. And four cities are still experiencing significant download speed drops: Lawrenceville, Georgia, Rochester, New York, Saint Paul, Minnesota, and new addition Evansville, Ind.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<p><strong>ICANN.Org said it has joined<\/strong> the <a href=\"https:\/\/www.cyberthreatcoalition.org\/\" rel=\"nofollow\">COVID-19 Cyber Threat Coalition (CTC)<\/a>, a group with the mission to stop cybercriminals from attacking institutions and individuals by playing on fears about the coronavirus pandemic. The group includes domain name service (DNS) registries, registrars, security experts, law enforcement, and Internet engineers.<\/p>\n<p>The CTC said its goal is to, \u201coperate the largest professional-quality threat lab in the history of cybersecurity out of donated cloud infrastructure and with rapidly assembled teams of diverse, cross-geography, cross-industry threat researchers.\u201d<\/p>\n<p>The group talked about the <a href=\"https:\/\/www.cisa.gov\/news\/2020\/04\/08\/uk-and-us-security-agencies-issue-covid-19-cyber-threat-update\" rel=\"nofollow\">impact of COVID-19-related attacks<\/a> and stated that credential phishing (33%) and scams (30%) are the most common tactics respondents reported, but malicious documents (18%) are also a popular attack vector.&nbsp;<\/p>\n<p><strong>The Cybersecurity and Infrastructure Security Agency (CISA)<\/strong> \u2013 part of the Department of Homeland Security \u2013 <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-099a\" rel=\"nofollow\">warned<\/a> of COVID-19 network-security issues with the most common including:<\/p>\n<ul>\n<li>Phishing, using the subject of coronavirus or COVID-19 as a lure<\/li>\n<li>Malware distribution, using coronavirus- or COVID-19- themed lures<\/li>\n<li>Registration of new domain names containing wording related to coronavirus or COVID-19<\/li>\n<li>Attacks against newly and often rapidly deployed remote-access and teleworking infrastructure<\/li>\n<\/ul>\n<p>CISA on April 8 <a href=\"https:\/\/www.cisa.gov\/trusted-internet-connections\" rel=\"nofollow\">released new guidance on how remote government workers<\/a> and potentially others should address network security.&nbsp; The \u201cinterim Trusted Internet Connections (TIC) 3.0 guidance to aid agencies in securing their network and cloud environments.\u201d CISA wrote: \u201cWhile this prior work has been invaluable in securing federal networks and information, the program must adapt to modern architectures and frameworks for government IT resource utilization. Accordingly, OMB\u2019s [Office of Management and Budget] memorandum provides an enhanced approach for implementing the TIC initiative that provides agencies with increased flexibility to use modern security capabilities.\u201d<\/p>\n<p><strong>The <a href=\"https:\/\/cofense.com\/new-phishing-campaign-spoofs-webex-target-remote-workers\/\" rel=\"nofollow\">Cofense Phishing Defense Center<\/a> (PDC) warned<\/strong> of a new phishing campaign that aims to harvest Cisco WebEx credentials via a security warning for the application, which Cisco\u2019s own Secure Email Gateway fails to catch. The phishing operation comes as Cisco\u2019s WebEx traffic is <a href=\"https:\/\/blogs.cisco.com\/sp\/how-is-your-broadband-holding-up\" rel=\"nofollow\">exploding<\/a>.&nbsp; The company said its <a href=\"https:\/\/www.sdxcentral.com\/articles\/news\/what-cisco-networking-learned-during-the-pandemic\/2020\/03\/\" rel=\"nofollow\">Cisco WebEx traffic grew 2.5 times<\/a> in the Americas and four times in Europe. WebEx traffic from <a href=\"https:\/\/www.sdxcentral.com\/articles\/news\/remote-worker-influx-strains-collaboration-services\/2020\/03\/\" rel=\"nofollow\">China is up 2,200%<\/a><a href=\"https:\/\/062249AC-AF8C-452F-A723-20E02930037A#_edn5\" rel=\"nofollow\">(6)<\/a>, with more than 73 million meetings in March and more than 324 million active attendees. That\u2019s two times as much as it typically handle on a high-traffic day.<\/p>\n<h2>UPDATE 4.3<\/h2>\n<p>In an April 2nd <a href=\"https:\/\/www.fcc.gov\/news-events\/blog\" rel=\"nofollow\">call<\/a> with the Federal Communications Commission chair, the nation\u2019s largest telecom and broadband providers reported network usage during the COVID-19 pandemic had risen about 20-35% for fixed networks and 10-20% for cellular networks in recent weeks. In general, company representatives reported that their networks were holding up quite well, and they expected that resilience to continue. In their conversation with Chairman Ajit Pai, no providers expressed concern about their networks\u2019 ability to hold up to increased and changing demand.&nbsp;<\/p>\n<p>\u201cOperators cited a general migration of traffic to suburban, exurban, and residential areas as more people work, learn, and access services from home during the pandemic.&nbsp; They said they would continue to monitor hotspots to be ready for any issues and proactively increase capacity in case peak traffic rises unexpectedly,\u201d the FCC stated. The call included Altice USA, AT&amp;T, CenturyLink, Charter, Cincinnati Bell, Consolidated Communications, Comcast, Cox, DISH, Frontier, Hughes, Mediacom, Northwest Fiber, Sprint, T-Mobile, TDS Telecom, TracFone, U.S. Cellular, Verizon, ViaSat, and Windstream.<\/p>\n<p>Broadband Now reported on April 1 that more of America\u2019s most populous cities saw decreases in median download speeds this week compared to the last. 117 cities (59%) have now shown signs of potential network strain, up from 88 cities (44%) in the previous week\u2019s report.&nbsp; The <a href=\"https:\/\/broadbandnow.com\/report\/internet-speed-analysis-top-200-cities-march-22-28th\/\" rel=\"nofollow\">company wrote<\/a> that 117 (59%) of the top 200 cities it was tracking have experienced download-speed degradations over the past week compared to the first 10 weeks of 2020. Five cities have observed download speed dips greater than 40%. In addition, 144 (72%) cities have experienced degradation in upload speeds, with three seeing decreases greater than 40%.<\/p>\n<p>Verizon reported that its Northeast and Mid-Atlantic regions appear to have the most people in the nation staying at home, according to its Verizon Network Report. Online collaboration surge nearly 10X versus a typical day, and growth in other internet uses has started to stabilize.<\/p>\n<p>Meanwhile, AT&amp;T said its core network traffic \u2013 which includes business, home broadband and wireless usage&nbsp;\u2013 was up 18% through April 1 compared to the same day in March. In a <a href=\"https:\/\/about.att.com\/innovationblog\/2020\/04\/anira.html\" rel=\"nofollow\">blog<\/a> AT&amp;T also noted a 700% increase in connections to its secure, cloud-based <a href=\"https:\/\/www.business.att.com\/content\/dam\/attbusiness\/briefs\/sd-wan-static-network-based-anira-product-brief.pdf\" rel=\"nofollow\">SD-WAN Static Network Based<\/a> (ANIRA) service in the past few weeks. &nbsp;ANIRA uses IPSec to authenticate and encrypt data packets over the broadband network.<\/p>\n<p>As many business and consumer users deploy videoconference services one of the most popular \u2013 Zoom \u2013 has also attracted attackers.&nbsp; So much so that the FBI <a href=\"https:\/\/www.ic3.gov\/media\/2020\/200401.aspx\" rel=\"nofollow\">on April 1<\/a> issued a warning saying that as large numbers of people turn to video-teleconferencing (VTC)&nbsp; to stay connected, reports of VTC hijacking, or \u201cZoom-bombing,\u201d are emerging nationwide.<\/p>\n<p>Malicious actors may target communication tools including VoIP phones, video conferencing equipment and cloud-based communications systems to overload services and take them offline or eavesdrop on conference calls. Cyber actors have also used VTC hijacking to disrupt conferences by inserting pornographic images, hate images or threatening language.<\/p>\n<p>As a result, some companies have banned or limited the use of Zoom, reports say. <a href=\"https:\/\/www.reuters.com\/article\/us-spacex-zoom-video-commn\/elon-musks-spacex-bans-zoom-over-privacy-concerns-memo-idUSKBN21J71H\" rel=\"nofollow\">Reuters<\/a> for example wrote that Elon Musk\u2019s rocket company SpaceX has banned its employees from using Zoom, citing \u201csignificant privacy and security concerns.\u201d The <a href=\"https:\/\/www.ic3.gov\/media\/2020\/200401.aspx\" rel=\"nofollow\">FBI offered the following steps<\/a> to help mitigate the problem:<\/p>\n<ul>\n<li>In Zoom, there are two options to make a meeting private: require a meeting password or use the waiting room feature and control the admittance of guests.<\/li>\n<li>Do not share a link to a teleconference or classroom on an unrestricted publicly available social media post. Provide the link directly to specific people.<\/li>\n<li>Manage screensharing options. In Zoom, change screensharing to \u201cHost Only.\u201d<\/li>\n<li>Ensure users are using the updated version of remote access\/meeting applications. In January 2020, Zoom updated their software. In their security update, the teleconference software provider added passwords by default for meetings and disabled the ability to randomly scan for meetings to join.<\/li>\n<\/ul>\n<h2>UPDATE: 3.30<\/h2>\n<p>AT&amp;T said its core network traffic \u2013 which includes business, home broadband and wireless&nbsp; \u2013 was up 24% through March 30 compared to the same day last month.&nbsp; It broke down some mobility traffic patterns as well: voice calls: +33%, instant messaging: +63%, text messaging: +41%, email: -18%, web browsing: -5%, video: +4% (also accounts for over half of all mobility traffic). It also usage for conferencing: AT&amp;T\u2019s global audio-conferencing solution: +200%; audio, web and video conferencing tools: +400%; Large-scale webcast events: +200%.<\/p>\n<p>AT&amp;T said its investment in artificial intelligence technology is helping it keep up with demand. For example, the company said AI is helping remotely troubleshoot and diagnose problems with customer equipment, by identifying the cause or even proactively identifying a potential issue before it occurs. \u201cWe\u2019ve expedited deployments of new AI capabilities in certain markets that will allow us to balance the traffic load within a sector and across sectors to help avoid overloading specific cells and improve the experience.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3534037\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nAs the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.\u00a0 What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.\u00a0 Check back frequently!UPDATE 4.17AT&amp;T reported that Email traffic is down 25% as more people opt for phone and video calls.\u00a0 Video conferencing is on the rise with more than 470k Webex Meeting Calls on April 9, the highest during the COVID-19 pandemic.\u00a0 It also stated instant messaging, including text traffic from messaging apps and platforms, has slightly declined since the week prior, but overall is up nearly 60%.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34489,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[762,307],"class_list":["post-34488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-18T03:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce\",\"datePublished\":\"2020-04-18T03:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/\"},\"wordCount\":1881,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg\",\"keywords\":[\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/\",\"name\":\"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg\",\"datePublished\":\"2020-04-18T03:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/networking\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/","og_locale":"en_US","og_type":"article","og_title":"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-18T03:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce","datePublished":"2020-04-18T03:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/"},"wordCount":1881,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg","keywords":["Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/","url":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/","name":"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg","datePublished":"2020-04-18T03:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/update-4-18-how-enterprise-networking-is-changing-with-a-work-at-home-workforce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/www.threatshub.org\/blog\/tag\/networking\/"},{"@type":"ListItem","position":3,"name":"UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34488"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34489"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}