Security Considerations for a Hybrid Working Environment

Des Ryan

Des Ryan

Solutions Director

Read Time, 3 min.

Over the past 20 months, we’ve seen significant changes in the cyber security threat landscape that are having a major impact on organisations of every size in every sector. The frequency and sophistication of cyber events have increased significantly. Unfortunately, this has security implications, which need to be closely managed to mitigate the risks across the organisation.

Microsoft recently released the Digital Defense report, which is filled with great global insights into what’s happening in the world of security, including The State of Cybercrime, Nation State Threats, Supply Chain, IOT and OT Security.  There is a whole section on Hybrid Working, which is a dilemma many of our customers and partners are working through at the moment. Additionally, actionable insights provide relevant guidance for organisations faced with cyber threats.

Irish Insights from Microsoft’s Digital Defense Report

One of the more startling statistics from that report was that Ireland is number one in the world when it comes to ransomware encounters. From an Irish perspective, the report shows that 58% of all cyber-attacks in the last twelve months have been perpetrated by Nation States. There is often the assumption here that Ireland is excluded from these types of attacks. The report also shows that Manufacturing and FSI are the two most targeted industries, both of which have considerable footprints here.

With this hybrid working environment and Ireland being at the centre of these attacks, we thought it would be a good opportunity to catch up with our friends from CWSI, one of Ireland’s most experienced modern workplace security and compliance specialists, about what’s happening with customers and the challenges that every organisation is facing today.

The following videos will delve into the following security topics:

Re-imagining security: explores how has hybrid working changed the management of risks for organisations, and if regular security controls are still relevant.

Best Practices: discusses the challenges in terms of security that remote working brings and how to verify trust in this new model.

Strengthen Continuous improvements: looks into how organisations can get the security baseline right, and how working with managed services or trusted partners can help.

Microsoft made two major announcements at our recent annual IGNITE event, aimed at helping address these challenges.

Building defences for Small businesses and Hybrid Worker – Microsoft Defender for Business

Specifically built to bring the power of enterprise-grade endpoint security to small and medium businesses with up to 300 employees, Microsoft Defender for Business empowers SMEs to elevate their security by moving from traditional antivirus to next-generation protection, endpoint detection and response, and threat and vulnerability management, whilst taking advantage of simplified setup and management. Defender for Business will be available both as a standalone solution and as integrated protection included within Microsoft 365 Business Premium. Learn more about Microsoft Defender for Business in this blog.

Extending Protection for hybrid – Microsoft Teams Connect: 

To thrive in this new world, every organisation needs a digital fabric that binds the organisation together with secure communication, collaboration, and creation, and enables flexibility and strengthen connections across people and teams. At the centre of it all is Microsoft Teams. This is what makes experiences likeMicrosoft Teams Connectalready possible today. Our flexible and dynamic identity platform, Azure AD, underpins Microsoft Teams to help ensure that every access request, whether internal or external, is secured. It makes establishing secure collaboration across organizational boundaries possible. Security leaders can easily establish inter-company trust, and all employees across multiple companies can collaborate as one extended team.

To understand what is happening and what threats are out there. Education is the first line of defence. To read more and to download the report go to Microsoft Digital Defense Report and Security Intelligence Reports

Download our latest research on the cyber security climate in Ireland

How new threats and the same bad habits pose serious risk to your organisation.

Discover more related articles per industry:


  • Surface Go

    Put more power in the hands of your Firstline Workers, wherever they are

    Firstline Workers are the day-to-day heroes of our public services; they’re often the first to engage with citizens, the first to represent your organization, and put your services into action. However, they’re often the last to get access to the latest technology. Better technology makes productivity more effective, by saving time and money, streamlining operations […]

Discover more related articles per dossier:

Customer Stories

  • Building trust with rock-solid security at Crowleys DFK

    Building trust with rock-solid security at Crowleys DFK

    By completing the first phase of its journey to ISO 27001 certification with a Microsoft Intune implementation, leading Irish firm of chartered accountants and tax advisors, Crowleys DFK can reassure its clients of exceptional data security practices. As ISO 27001 certification is the gold standard internationally for information security management and GDPR compliance, it takes […]

Digital Transformation

  • Sofie using Surface in airport lounge

    Why technology is key to keeping a creative team connected

    The one-size-fits-all approach no longer works. Set working hours and rigidly defined job roles are out; flexibility and creativity are in. Everybody wants a ‘fluid’ workplace, where the boundaries between our work and our passions are blurred. Work should be fun. It should be empowering. It should be fulfilling. Defining how, where and when you work is a huge pull for talented […]

Security & Privacy


  • Microsoft Protect center

    Data in motion – how to protect it – 5 Key Considerations

    Data in motion – how to protect it – 5 Key Considerations  Now, more than ever, it’s critical to protect your data at the file level. Data is the most valuable asset you control. Losing intellectual property, a customer’s personally identifiable information (PII), financial information, and confidential memos can cause substantial damage. But it’s not […]