Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > Navigating IT Security in a Post Pandemic World – How Corporate Networks are the Future of Business
    Business

    Navigating IT Security in a Post Pandemic World – How Corporate Networks are the Future of Business

    Published by Jessica Weisman-Pitts

    Posted on August 10, 2022

    6 min read

    Last updated: February 4, 2026

    A diverse group of young business professionals engaging in a discussion about IT security in a post-pandemic world, highlighting the importance of corporate networks for future business operations.
    Group of young business professionals collaborating on IT security strategies - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Tags:cybersecuritytechnologyfinancial managementrisk management

    By Brian Yelm, Managing Director at Cerberus Sentinel

    The last two years seem to have thrown most organizations some cultural and IT management curve balls. From individuals’ learning to establish work-life balance while working from home, to businesses who have been forced to adopt remote working strategies that accommodate travel, relocation, or just at-home hours and access, there are new norms. Despite the fact that many organizations are pushing a return to the office, research indicates there may be some resistance to this from employees who much prefer life without a commute. Perhaps the most important lesson to come out of this cultural work shift is a challenge to the preconceived notion that one needs a fully operational, physical office in order to conduct business.

    Where does this leave internal network security teams? Technology vendors were lining up in 2020, promising to have the next blinky box that would make everyone safe. However, if we have learned anything in the last two years, it is that cyber attacks happen whether you operate in a brick-and-mortar location, or some/all of your teams are remote, and whether or not you have that blinky box. As seen in the most recent HubSpot and WatchGuard compromises, even the blinky box can be compromised. As if there weren’t enough to worry about before, there are still new threat groups showing up on the scene all the time, like Lapsus$, and they’re wreaking havoc with targeted cyberattacks. The good news is, people seem to understand the threat landscape a little bit better.

    Across industrial verticals, leaders in business and industry have revealed that the pandemic has brought about an acceleration of cultural awareness regarding cybersecurity. This accelerated progress is in many ways due to the increased number of workers shifting to a work-from-home (WFH) environment. The fact that more people work remotely or adopt a hybrid working approach means that businesses have an opportunity to cultivate a comprehensive cybersecurity culture to protect their workers and networks from a series of widening attack vectors. This is because the need for appropriate cybersecurity protocols has been properly emphasized after decades of relative neglect in favor of more material concerns, which now seem less important in the current working climate.

    Protecting and Prioritizing the Network

    This strange season seems to have hurtled many businesses into the 21st Century as, finally, more awareness is given to the critical need for network security, including endpoints. Endpoint security is now more essential than ever. In the past, cybersecurity has been notoriously difficult to quantify from a financial perspective, lacking a serious metric that can measure return on investment (ROI). However, for the most part, those days are behind us, as the culture is shifting to this new way of interacting, where companies rely on their networks even more – for connectivity, reliability, and security around-the-clock, anywhere in the world.

    It is important to remember that cybersecurity is a culture, not a product. Part of this culture is the realization that business truly is dependent on smooth network operation, and that includes network monitoring. When you consider the importance of corporate networks, and the interconnectivity that they afford, you can see that losing control of your network to attackers will most certainly be the downfall of any organization who doesn’t implement major mitigating controls that support this new connectivity, such as Zero Trust Networking, around-the-clock monitoring and response, and updated access control policies and procedures seriously. Don’t let it be yours.

    Network downtime causes lost business, and network shortages can result in your business shutting off entirely. Nothing spells downtime and shortage faster than ransomware. This further emphasises just how critical protecting your network is: People and assets are important, but the network is essential. If you don’t have that, your people and assets can’t play their part – hence, you don’t have a company.

    How Cultivating a Culture of Cybersecurity is the Key to Future Business

    As a short-term solution for this issue, many enterprises have extended their network in non-traditional ways very quickly in order to address the need for flexible work capability for a large percentage of their workforce. While this may be a temporary solution, it is important to note there are clear security implications when you do anything quickly – especially when it comes to corporate network structure. Now is the time to go back and architect smarter, more secure solutions, perhaps speeding up digital transformation initiatives and having security engineers review them. So, if your company was one that deployed hasty network expansion in order to maintain security for employees working from home, your security team should now be constantly monitoring all IT assets and knee deep in digital transformation to improve and upgrade in such a way that they can maintain security across all aspects.

    Business-leaders should ask themselves these simple questions: did you play it correctly? Did someone oversee security at all stages of evolution? Have you brought in a third-party to assure the security of networks after the fact? Have you shown due diligence to prove that your network is not only functional, but safe from all angles? Is any part of your environment currently being left out of security testing? (If so, you likely have problems that have not yet been addressed.) Once these questions have been adequately answered, you should add this into your classic IT disciplines of capacity planning, availability, vulnerability management and all other aspects on this side of the network divide.

    New considerations:

    Now we must start thinking about the other side of the network – disaster recovery and incident response planning. Availability management is often overlooked in a rush to get things up and running. No one puts the time into thinking what happens if my primary business application gets overloaded or goes down. These networks don’t even have to go down entirely. Instead they could be subjected to a Denial-of-service (DDoS) attack. All of a sudden, the platform that you depend on can no longer support your services and processes.

    Do you have a comprehensive business continuity plan or network backups in place if something were to happen to your primary networks? Can your backups be accessed via the network? (If so, that makes them easy picking for attackers.) Who will help you in the event of an attack? The truth that the network is the new heart of your business has serious connotations that many institutions have not yet begun to fully consider. As with all things cyber, it is important to identify and address gaps quickly, as cybercriminals are notoriously opportunistic and will seek any opportunity possible to come between you and your network.

    These are all considerations that must be discussed and actioned as we embrace this brave new world of conducting business from our spare bedrooms. Establishing a comprehensive contingency plan that aims to minimize downtime is an important step when cultivating a culture of cyber-aware workers.

    To discuss your business continuity and disaster recovery (BCDR) or incident response (IR) plans – or to talk with someone about getting an objective gap assessment, please [REQUEST A CONSULTATION HERE].

    Frequently Asked Questions about Navigating IT Security in a Post Pandemic World – How Corporate Networks are the Future of Business

    1What is cybersecurity?

    Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. These attacks often aim to access, change, or destroy sensitive information.

    2What is network security?

    Network security involves measures to protect the integrity, confidentiality, and accessibility of computer networks and data. It includes both hardware and software technologies.

    3What is business continuity?

    Business continuity is the planning and preparation to ensure that a company can continue to operate in case of serious incidents or disasters.

    4What is incident response?

    Incident response is the approach taken by an organization to prepare for, detect, and respond to cybersecurity incidents. It aims to minimize damage and recovery time.

    5What is endpoint security?

    Endpoint security refers to the security measures taken to protect endpoints on a network, such as computers and mobile devices, from being exploited by malicious actors.

    More from Business

    Explore more articles in the Business category

    Image for Empire Lending helps SMEs secure capital faster, without bank delays
    Empire Lending helps SMEs secure capital faster, without bank delays
    Image for Why Leen Kawas is Prioritizing Strategic Leadership at Propel Bio Partners
    Why Leen Kawas is Prioritizing Strategic Leadership at Propel Bio Partners
    Image for How Commercial Lending Software Platforms Are Structured and Utilized
    How Commercial Lending Software Platforms Are Structured and Utilized
    Image for Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Oil Traders vs. Tech Startups: Surprising Lessons from Two High-Stakes Worlds | Said Addi
    Image for Why More Mortgage Brokers Are Choosing to Join a Network
    Why More Mortgage Brokers Are Choosing to Join a Network
    Image for From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    From Recession Survivor to Industry Pioneer: Ed Lewis's Data Revolution
    Image for From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    From Optometry to Soul Vision: The Doctor Helping Entrepreneurs Lead With Purpose
    Image for Global Rankings Revealed: Top PMO Certifications Worldwide
    Global Rankings Revealed: Top PMO Certifications Worldwide
    Image for World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    World Premiere of Midnight in the War Room to be Hosted at Black Hat Vegas
    Image for Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Role of Personal Accident Cover in 2-Wheeler Insurance for Owners and Riders
    Image for The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    The Young Rich Lister Who Also Teaches: How Aaron Sansoni Built a Brand Around Execution
    Image for Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    Q3 2025 Priority Leadership: Tom Priore and Tim O'Leary Balance Near-Term Challenges with Long-Term Strategic Wins
    View All Business Posts
    Previous Business PostWhy digital acceleration is important?
    Next Business Postimpact.com Announces Appointment of Ning Wang to Board of Directors