Cybersecurity imperatives for securing the hybrid workforce

Gettyimages.com/ luismmolina

Find opportunities — and win them.

Best practices and strategies are needed to protect controlled unclassified information in an era of remote work and expanding digital attack surfaces, writes Tevora President Nazy Fouladirad.

Hybrid working models have become commonplace in all industries - from finance and distribution to software development and government contracting. While this shift has afforded organizations better flexibility when scaling their operations, it has also widened their digital attack surfaces.

In the government sector, this has become a critical concern for federal agencies and their partners. Challenges to ensuring the safety of controlled unclassified information (CUI) and other vital assets shared through digital platforms continue to mount, and contractors must ensure they have the right best practices in place to minimize the likelihood of security breaches and data leakage.

Cybersecurity Challenges in Government Sectors

Government contractors working with organizations in various sectors, such as healthcare, defense planning, public safety, and intelligence, are responsible for ensuring data security. There are several challenges, however, that need to be addressed when providing this day-to-day service. Some of these include:

  • Targeted Attacks - The government sector is a regular target for cybercriminals looking specifically at contractors as a source of valuable CUI and other forms of intellectual property.
  • Data Breaches - Hybrid workforces with employees heavily dependent on accessing resources outside of physical office locations are more prone to data breaches caused by compromised user credentials and lack of proper access restrictions.
  • Supply Chain Vulnerabilities - Since most organizations now rely on a network of third-party vendors to support their business, these relationships can expand attack surfaces and create new sources for data leakage and compliance issues if not properly secured.

Cybersecurity Best Practices for the Hybrid Workforce

When operating a business that utilizes a hybrid workforce, it’s important to put in place the right cybersecurity best practices. Some of these include:

  • Strong Access Controls -- With employees working from multiple outside sources, it’s critical to ensure you have strong access controls. Most modern organizations adopt Zero Trust principles to help enforce stricter policies when granting access. Making MFA (Multi-Factor Authentication) mandatory and minimizing the use of administrator accounts is also critical.
  • Device Security Protocols -- Regardless of the devices employees use to access company resources online, the right protocols should be in place to keep these connections secure. Endpoint protection software and MDM (Mobile Device Management) tools are smart investments for government contractor businesses. They help them enforce better security practices while monitoring their network traffic for potential threats.
  • Network Protection -- Hybrid workforces need strong network protection to facilitate the safe exchange of information when connecting with outside sources. This includes the incorporation of VPNs (Virtual Private Networks), firewalls, and various IDS/IPS (Intrusion Detection/Prevention Systems). Scanning your network for potential vulnerabilities or investing in penetration testing services can help identify dangerous weaknesses in security and provide the context needed to help remediate them.
  • Security Awareness Training -- Another critical element of cybersecurity readiness is ensuring all employees know the constant dangers of working in a hybrid workforce. They should be well-trained on spotting and avoiding phishing attempts and applying safe password practices when establishing user accounts on behalf of the business.

How to Adapt to a More Secure Hybrid Model

Successfully adapting to a more secure hybrid business model requires a strategic planning approach. Government contractors are expected to build a strong security framework that involves clear and effective policies along with following certain best cybersecurity practices:

  • Remote Working Policies -- When your business offers remote working conditions, it’s also important to have clear policies regarding how employees should access company resources and handle sensitive data.Businesses should also ensure that company passwords are never shared between employees and that best practices are followed when creating login credentials that aren’t easy to guess and changed regularly to maximize security.
  • Protected Collaboration Tools -- Most organizations with distributed workforces invest in various communication platforms to help their teams stay connected. While these tools can be a great way to ensure everyone is on the same page, they can be another source of data leakage if they aren't correctly secured. This is especially true since sensitive files are often shared directly through these platforms to avoid using email or other methods. If unauthorized individuals can access these platforms, they’ll have immediate access to this data, potentially compromising business security.
  • Regular Security Assessments -- It’s important not to allow your business to become complacent about potential security threats over time. To help avoid this, routine security assessments can help. These assessments can be performed internally or by engaging with third-party auditors who can help identify and prioritize vulnerabilities in your organization. This can be especially helpful when trying to achieve HITRUST certifications and other industry-recognized accolades that showcase your organization’s dedication to data privacy and security.
  • Vendor Risk Management Protocols -- Cybersecurity readiness isn’t just limited to your business’s internal processes. It also extends to various third-party relationships you may have with certain vendors. Due diligence is critical when establishing partnerships with other organizations that are given access to your data. Vendor risk management protocols should be in place to ensure your vendors have adequate security policies for minimizing attack surfaces and having clear incident response plans.

Create a More Secure Contracting Business

Hybrid working models are incredibly convenient and provide businesses with the much-needed flexibility they need to scale their organizations. However, for government contractors, ensuring that your business foundation is secure is vital. By following the guidelines discussed while  minimizing your exposure to cybersecurity threats.


Nazy Fouladirad is president and chief operating officer of Tevora, a global cybersecurity consultancy. She has dedicated her career to creating a more secure business and online environment for organizations across the country and world. She is passionate about serving her community and acts as a board member for a local nonprofit organization.

Linkedin: https://www.linkedin.com/in/nazy-fouladirad-67a66821