{"title":"在混合工作环境中推动最佳安全实践","authors":"Simon Mullis","doi":"10.12968/s1353-4858(22)70057-8","DOIUrl":null,"url":null,"abstract":"The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"31 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Driving best practice security in a hybrid working world\",\"authors\":\"Simon Mullis\",\"doi\":\"10.12968/s1353-4858(22)70057-8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"31 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(22)70057-8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(22)70057-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Driving best practice security in a hybrid working world
The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.