{"id":40840,"date":"2021-05-12T13:00:56","date_gmt":"2021-05-12T13:00:56","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=93424"},"modified":"2021-05-12T13:00:56","modified_gmt":"2021-05-12T13:00:56","slug":"securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/","title":{"rendered":"Securing a new world of hybrid work: What to know and what to do"},"content":{"rendered":"<p>The cybersecurity landscape has fundamentally changed, as evidenced by <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/17\/cyberattacks-cybersecurity-solarwinds-fireeye\/\" target=\"_blank\" rel=\"noopener noreferrer\">large-scale, complex attacks like Nobelium<\/a>, Hafnium, and more recently last week\u2019s Colonial Pipeline attack, which signals that <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\" target=\"_blank\" rel=\"noopener noreferrer\">human-operated ransomware is on the rise<\/a>.<\/p>\n<p>Hackers launch an average of 50 million password attacks every day\u2014579 per second. Phishing attacks have increased. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/30\/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">Firmware attacks are on the rise<\/a>, and ransomware has become incredibly problematic. And while Microsoft intercepted and thwarted a record-breaking 30 billion email threats last year, our work is never done.<\/p>\n<p>We are now actively tracking 40 plus active nation-state actors and over 140 threat groups representing 20 countries\u2014that number used to be a handful.<\/p>\n<p>We are also rapidly delivering innovation to meet the needs of a changing landscape and you can read more about our <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/12\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/\" target=\"_blank\" rel=\"noopener noreferrer\">latest product updates for RSA<\/a> in a blog I published today.<\/p>\n<p>Security continues to be a number one priority for our customers, especially as many companies around the world are looking to transition from remote work to hybrid. To truly meet this challenge, defenders across the industry must come together for an end-to-end, Zero Trust security approach that covers the entire technology ecosystem. Because today, digital transformation cannot happen without security transformation.<\/p>\n<h2>The future of work is hybrid: Here\u2019s what we can do<\/h2>\n<p>Even as many people start to transition back to the office, we expect a future where hybrid work is the norm. <a href=\"https:\/\/go.forrester.com\/blogs\/employee-experience-in-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester predicts<\/a> that once people have settled into their new work patterns post-pandemic, we will still see a 300 percent increase in employees working remotely from pre-pandemic levels. According to our own Work Trend Index, <a href=\"https:\/\/www.microsoft.com\/en-us\/worklab\/work-trend-index\/hybrid-work\" target=\"_blank\" rel=\"noopener noreferrer\">The Next Great Disruption is Hybrid Work\u2014Are We Ready?, <\/a>46 percent of people plan to move because they can now work remotely.<\/p>\n<p>People are working on corporate networks and home networks and moving fluidly between business and personal activity online thanks to technologies intertwined with both aspects of our daily routines. The network is changing with employees\u2019 home networks and devices are now part of the corporate network. What this means for organizations is that the network is suddenly without firm borders.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-93517 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-scaled.jpg\" alt=\"Chart detailing the future of hybrid work. With communication at a high, networks are shifting and threats are increasing.\" width=\"2560\" height=\"1919\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-scaled.jpg 2560w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-300x225.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-1024x768.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-768x576.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-1536x1152.jpg 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/05\/MSFT_SecurityInfographic_05.12.21_FINAL-2048x1536.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\"><\/p>\n<h2>Our own approach<\/h2>\n<p>My friend and colleague Bret Arsenault, Microsoft\u2019s Chief Information Security Officer, had the mammoth task of transitioning Microsoft and its 160,000 plus employees to remote work in March 2020 and has <a href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/implementing-a-zero-trust-security-model-at-microsoft\" target=\"_blank\" rel=\"noopener noreferrer\">created our technology plan to transition to hybrid work<\/a>.<\/p>\n<p>Bret\u2019s approach to solving this has been to foster a culture where security is everyone\u2019s job. Just today, new guidance went out on a few areas:<\/p>\n<ul>\n<li><strong>Keeping devices healthy and managed:<\/strong> All devices that need access to corporate resources must be managed to seamlessly keep your device secure and protected from phishing and malicious websites.<\/li>\n<li><strong>Making security everyone\u2019s job:<\/strong> We will offer new training, opportunities to provide feedback, and a new virtual security summit to ensure our employees are empowered and equipped to be more secure.<\/li>\n<li><strong>Securing home offices:<\/strong> We will continue to build and offer resources and guidelines for employees that will work remotely either part or full time.<\/li>\n<li><strong>Building for Zero Trust:<\/strong> We are asking our developers to build with a Zero Trust mentality.<\/li>\n<\/ul>\n<p>While we have been remote, and as part of our Zero Trust approach, we have also been moving <a href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/securing-microsofts-network-with-an-internetfirst-zero-trust-model\" target=\"_blank\" rel=\"noopener noreferrer\">employees off the corporate network<\/a>. An internet-first approach reduces exposure and gives employees a consistent experience whether they are at home or in the office.<\/p>\n<p>We believe that security is a team sport and that when we share what we\u2019re learning, we can all make the world a safer place. So we are sharing Bret\u2019s guidance with our customers and partners. These specific steps will be the first of many in ensuring our hybrid workforce is as secure as possible.<\/p>\n<p>There are other practical things that we will continue to focus on, and every business should consider as we move into hybrid work.<\/p>\n<h2>Identity is more important than ever: Use the tools you likely already have to protect it<\/h2>\n<p>Through NOBELIUM and other recent attacks, a clear theme has emerged\u2014identity is the battleground for attacks of the future. We know weak passwords, password spraying, and phishing are the entry point for the vast majority of attacks. As our own CISO, Bret Arsenault, likes to say, \u201chackers don\u2019t break in, they log in.\u201d<\/p>\n<p>In building a defense for our new threat landscape, the first thing every business should do is examine the tools they already have.<\/p>\n<p>A great example of this is multifactor authentication (MFA). MFA is a defense that our customers have available to them, yet when looking at our own customer data, only 18 percent have it turned on. Any customer with a commercial service subscription\u2014Azure or Microsoft 365\u2014can turn on MFA at no additional cost.<\/p>\n<p>We saw a significant jump in usage when the pandemic began. And when that happened, we saw a significant decrease in aggregate compromises\u2014people thought they were activating to protect only remote access, but MFA protects the entire network.<\/p>\n<p>We work with many kinds of organizations of all sizes\u2014for some, implementing MFA is as easy as flipping the switch. But we understand and empathize that for others it\u2019s much more complex. We\u2019re actively working to make MFA rollout easier and more seamless for our customers, as well as ensuring that the end-user experience is as frictionless and friendly as possible. We are dedicated to working alongside our customers to make everyone more secure. We\u2019ve introduced a number of programs to drive MFA adoption\u2014from the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/introducing-security-defaults\/ba-p\/1061414\" target=\"_blank\" rel=\"noopener noreferrer\">introduction of security defaults<\/a> to giving customers an entire<a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=57600\" target=\"_blank\" rel=\"noopener noreferrer\"> toolset for internal communications<\/a>.<\/p>\n<h2>Embrace a Zero Trust mindset<\/h2>\n<p>In a world where identity is the new battleground, adopting a Zero Trust strategy is no longer an option, it\u2019s a new business imperative. People and organizations need to have trust in the technologies that bring them together. The term Zero Trust may feel like the opposite of that, but when you assume breach and provide the least privileged access necessary, it actually empowers employees with the flexibility and freedom they want.<\/p>\n<p>The hybrid world is largely perimeterless, so wrapping protections around identity and devices is critical. As part of Zero Trust, we also think <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/11\/preparing-your-enterprise-to-eliminate-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">the future is passwordless<\/a> and we will start to see that transition this year.<\/p>\n<p>In fact, to help our customers on their Zero Trust journey we are excited to roll out a new Zero Trust assessment tool today that can help companies understand where they are currently and where they need to go.<\/p>\n<p>For a deeper look at the imperatives around Zero Trust and how Microsoft is reimagining the concept of identity for a perimeterless world, read Joy Chick\u2019s blog, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/28\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/\" target=\"_blank\" rel=\"noopener noreferrer\">5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond<\/a>, from Microsoft Ignite.<\/p>\n<h2>Take advantage of more robust security in the cloud<\/h2>\n<p>The benefits of the cloud for a remote or hybrid workforce are plentiful. Business-critical information can be accessed over the network, making it easy to have workers in any location.<\/p>\n<p>Over the next 6 to 12 months, we will see rapid migration to the cloud, as companies recover from 2020 and implement new infrastructure. In a recent survey of our Microsoft Intelligent Security Association (MISA) partners, 90 percent reported that customers have accelerated their move to the cloud due to the pandemic.<\/p>\n<p>Having a strong cloud posture also provides a level of security that most companies just couldn\u2019t achieve on their own. And we learned from NOBELIUM that the vast majority of attacks originated on-premises, while attacks via the cloud were largely unsuccessful.<\/p>\n<h2>Invest in people and skills\u2014and focus on diversity<\/h2>\n<p>We know that attackers exploit not just our digital holes, but the holes in our defender teams. Right now, we have two big problems: a shortage of cybersecurity professionals and a lack of diversity within teams. In the coming year, attackers will find these gaps and take advantage.<\/p>\n<p>There is an estimated shortfall of 3.5 million security professionals this year\u201491 percent of our MISA partners report more demand than supply for cybersecurity professionals. This shortage can mean not only unfilled positions but also too much work on the shoulders of existing teams.<\/p>\n<p>How do we solve this? We build the workforce of the future. We teach, train, and arm new defenders. After all, anyone can be a superhero of cybersecurity. It just takes passion and purpose\u2014and some skilling.<\/p>\n<p>I firmly believe anyone can be a defender, and with the proper training programs, we can all work together to build a cybersecurity workforce that reflects our planet. We must build diverse teams that reflect the many viewpoints of people globally, including the same demographics as the attackers themselves, to meet the security and privacy challenges of our time.<\/p>\n<p>That\u2019s why we\u2019re pleased to offer new <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-identity\/microsoft-commitment-to-close-security-skills-gap\/ba-p\/2148074\" target=\"_blank\" rel=\"noopener noreferrer\">skilling programs and certifications across security, compliance, and identity<\/a>. There are programs available for all levels of expertise, no matter where a defender is on their journey.<\/p>\n<p>Fortunately, in a future where remote work is more common, the world is our oyster in terms of cultivating new and diverse talent. No longer constrained by physical office locations, it\u2019s an exciting time to find the next generation of defenders and help them develop.<\/p>\n<h2>What\u2019s next<\/h2>\n<p>We\u2019re emerging from a year that has altered the world forever. It changed the way we live and work, brought new challenges in cybersecurity, and reminded all of us that there is no playbook for change.<\/p>\n<p>But where there\u2019s uncertainty, there is also the power to shape the world in positive and profound ways. At the heart of security and privacy protection is the freedom to imagine, plan, empower, and inspire.<\/p>\n<p>As security professionals, it is within our superpowers to help people and organizations feel safe and be safe\u2014to help them persist in the face of adversity with optimism, empathy, and peace of mind.<\/p>\n<h2>Learn more<\/h2>\n<p>Learn more about <a href=\"https:\/\/news.microsoft.com\/securing-hybrid-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s approach to securing hybrid work<\/a>, including context from our CISO Bret Arsenault, as well as a link to his new podcast Security Unlocked.<\/p>\n<p>You can also <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">assess your Zero Trust maturity stage<\/a> to determine where your organization is and how to move to the next stage.<\/p>\n<p>To learn more about Microsoft security solutions and how to optimize your Zero Trust strategy, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>. Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/12\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security continues to be a number one priority for our customers, especially as many companies around the world are looking to transition from remote work to hybrid. To truly meet this challenge, defenders across the industry must come together for an end-to-end, Zero Trust security approach that covers the entire technology ecosystem.<br \/>\nThe post Securing a new world of hybrid work: What to know and what to do appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40841,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-40840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing a new world of hybrid work: What to know and what to do 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing a new world of hybrid work: What to know and what to do 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T13:00:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1919\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Securing a new world of hybrid work: What to know and what to do\",\"datePublished\":\"2021-05-12T13:00:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/\"},\"wordCount\":1754,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/\",\"name\":\"Securing a new world of hybrid work: What to know and what to do 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg\",\"datePublished\":\"2021-05-12T13:00:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg\",\"width\":2560,\"height\":1919},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing a new world of hybrid work: What to know and what to do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing a new world of hybrid work: What to know and what to do 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/","og_locale":"en_US","og_type":"article","og_title":"Securing a new world of hybrid work: What to know and what to do 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-12T13:00:56+00:00","og_image":[{"width":2560,"height":1919,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Securing a new world of hybrid work: What to know and what to do","datePublished":"2021-05-12T13:00:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/"},"wordCount":1754,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/","url":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/","name":"Securing a new world of hybrid work: What to know and what to do 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg","datePublished":"2021-05-12T13:00:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do.jpg","width":2560,"height":1919},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Securing a new world of hybrid work: What to know and what to do"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40840"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40841"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}