{"title":"关键任务数据在混合环境中更为复杂","authors":"Robbie Allen","doi":"10.12968/s1353-4858(22)70063-3","DOIUrl":null,"url":null,"abstract":"It's hard to think of a bigger disruption to organisations’ overall IT infrastructure than hybrid working. Suddenly, but out of necessity, the comforting assumption that all devices and data would be protected by carefully planned protocols, well-configured firewalls and excellent staff training has gone. In its place is the anxiety of new risks, such as a USB stick with confidential data becoming lost in transit, family members borrowing a work laptop and accessing company files, passwords carelessly being shared, or networks being misused.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"41 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mission-critical data is more complex in a hybrid world\",\"authors\":\"Robbie Allen\",\"doi\":\"10.12968/s1353-4858(22)70063-3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It's hard to think of a bigger disruption to organisations’ overall IT infrastructure than hybrid working. Suddenly, but out of necessity, the comforting assumption that all devices and data would be protected by carefully planned protocols, well-configured firewalls and excellent staff training has gone. In its place is the anxiety of new risks, such as a USB stick with confidential data becoming lost in transit, family members borrowing a work laptop and accessing company files, passwords carelessly being shared, or networks being misused.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"41 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(22)70063-3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(22)70063-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mission-critical data is more complex in a hybrid world
It's hard to think of a bigger disruption to organisations’ overall IT infrastructure than hybrid working. Suddenly, but out of necessity, the comforting assumption that all devices and data would be protected by carefully planned protocols, well-configured firewalls and excellent staff training has gone. In its place is the anxiety of new risks, such as a USB stick with confidential data becoming lost in transit, family members borrowing a work laptop and accessing company files, passwords carelessly being shared, or networks being misused.