banner

BLOG

Remote Work's Open Doors: The New Security Crisis

“Can you hear me?” has been turned into the standard form of our time. But nowadays the question that CIOs and CISOs must pose themselves is, “Who’s listening—who shouldn’t be?” Remote, along with hybrid working, has redefined the boundaries of confidentiality.

The problem? Open doors are any Zoom or Teams meeting, any unvetted vendor account, and any unsecured device.  The real question isn’t IF— it’s WHEN and how many entry points are still exposed.

The challenge: A security perimeter that no longer exists.

Earlier, the industry security stronghold was the corporate firewall. In the hybrid work era, those traditional perimeter firewalls no longer shield your digital boundaries.  The new perimeter will be personal devices, home Wi-Fi networks, co-working spaces, and SaaS systems, including third-party vendors, who have access to this luxury. This increased attack surface has been revealed by recent breaches.

Royal Mail Group (2025)

The personal files of Royal Mail’s group and video conferences were leaked because the third-party vendor was compromised, showing that the collaboration platforms can be high-value targets themselves.

Zoombombing (2024–25)

During disrupted state board meetings aired in Indiana and in schools, the access control (no passcodes, duplicated personal meeting IDs) was weak, providing an opportunity for attackers to gain control of the meetings.

The severity of these disruptions had gone to the extent that Michigan had criminalised Zoombombing as a felony.

Marks & spencer (2025) & Ticketmaster (2024)

The two violations were a result of hacked third-party accounts without MFA. First is that M&S suffered massive payment delays and a loss of £570M in market value and the second one is that 560M customer records were leaked due to compromised vendor credentials.

It is quite simple, if your vendors’ weak MFA policies, your security remains as low as its vendors.

Insider threats: Coinbase, SAS, and AT&T

  • Coinbase (2025): Personal customer information was compromised by bribing support staff.
  • UK SAS (2025): 10 years ago, the names of the staff were unintentionally leaked due to poor governance—as testimony that management is worse than bad intent.
  • AT&T (2024): AT&T cloud provider Snowflake has resulted in millions of records being compromised because of its weaknesses.

Zoom CVE-2025-49457

Zoom patched the critical DLL bug with a CVSS severity of 9.6, which could possibly be used in an attempt to breach the whole system.

The takeaway? Even trusted sites must be updated regularly—they should be patched— pervasiveness is the enemy of security.

The insight: Why these breaches keep happening

The incidents that have occurred above are not solitary—they signify that remote working systems are at security risk. Five key insights show why remote work security is so futile:

  • The perimeter has dissolved: Your security fabric considers all devices, meetings and vendors.
  • The new battleground is identity: There was a shared lack of MFA and bad credential hygiene in Ticketmaster, M&S, et cetera.
  • Man still is the weakest element: Someone will open doors—or leave them open—from bribed insiders (Coinbase) to careless publishing (SAS).
  • Your new perimeter is the vendors: The experience of AT&T and Royal Mail shows that without verification in your supply chain, you are on an open invitation to attackers.
  • The tools that you depend on should be observed: The Zoom CVE demonstrated that collaboration tools may turn into a liability unless they are patched in time.

The overarching truth? The business risk of remote work is not only an IT risk but also a business risk since it has not been re-engineered to ensure security.

The solution: A layered approach to remote work security

The open doors have to be closed with people, process and technology strategy. The following is the structure that we use at Intwo, which is driven by the security ecosystem published by Microsoft.

People: Training and awareness

  • Ongoing training: Phishing practices, social engineering, and governance guidelines.
  • Clarity of policies: The employees should understand what tools are allowed- and which are not.
  • Insider threat management: Perform post-termination audits and make access expire to avoid remaining vulnerabilities.

Process: Governance and compliance

  • Vendor risk management: Have MFA on all vendor accounts; have SLAs with security obligations.
  • Remote access controls: Require VPNs, conditional access and least privilege controls of sensitive systems.
  • Review and compliance audit: Prevent SAS-like data leakages by ensuring that the data is governed before being published.
  • Regulatory alignment: GDPR, HIPAA, and other regulations require powerful measures of remote work data.

Technology: Modern security controls

  • MFA everywhere: The Non-negotiable. Both Ticketmaster and M&S breaches were caused by the lack of MFA.
  • Zero Trust architecture: The new perimeter is Identity. Check explicitly, least privilege and assume breach.
  • Patch management: Patch collaboration platforms regularly to prevent vulnerabilities such as the Zoom CVE-2025-49457.
  • Secure collaboration:
    • Microsoft Teams: Default encrypted (TLS, SRTP), default MFA/SSO through Entra ID and advanced governance with Microsoft Purview.
    • Zoom: Use passcodes, waiting rooms, and disable personal meeting IDs for sensitive calls. Enable E2EE for critical sessions.
    • Data protection: Passcodes, waiting rooms, and turn off PMI on sensitive calls. Turn on E2EE when it is necessary.
    • Threat detection & monitoring: Continuous alerts of the unusual patterns of the login, the impossible travel, or unauthorized sharing.

Proof: Preventable breaches

The same is the story of every big incident:

  • Ticketmaster: MFA could have prevented the vendor compromise.
  • Marks and Spencer: Supplier risk management would have been less exposed.
  • Coinbase: Bribed access would have been avoided by Coinbase’s insider threat monitoring.
  • SAS: Content review policies would have prevented leaks of information.
  • Zoom CVE: Systemic compromise is prevented by timely patching.

How Intwo secures remote workplaces with Microsoft

At Intwo, we assist the CIOs and CISOs to transform the messiness of remote collaboration into secure collaboration. Our model involves advice, implementation, and services:

Partnering with Intwo and Microsoft you get secure collaboration, continuous monitoring and zero trust defence by sealing the potential entry points against attackers.

Conclusion: Remote work security is a strategic advantage

Remote work is here to stay, but so are the risks. The difference between being tomorrow’s breach headline and being a trusted brand lies in how fast and how firmly you act.

The challenge is real. The insight is clear. The solution is available.

Don’t wait until your next Zoom or Teams call becomes a liability. Partner with Intwo to secure your remote workplace today.

October 21, 2025

images
Dr. Lazaro Serrano - Cybersecurity Expert

As Regional Information Security Officer, I oversee cybersecurity operations and MSSP/SOC services, ensuring 24/7 protection for our organization and clients. I develop and implement security policies, deliver awareness training, manage incidents, and help clients maintain regulatory compliance to reduce risk and strengthen resilience.

FREQUENTLY ASKED QUESTIONS

Remote work has fundamentally changed the security landscape because employees now access corporate data from locations and devices outside the traditional office perimeter. Home networks, personal laptops, public Wi-Fi, and unmanaged endpoints all introduce vulnerabilities that did not exist when work stayed within company walls. The attack surface has expanded significantly, and many organizations have not updated their security strategies to match. Without the right controls, every remote connection becomes a potential entry point for cybercriminals.

The most common threats include phishing attacks that exploit the isolation of remote workers, ransomware delivered through malicious attachments, unsecured home networks with weak passwords and outdated routers, shadow IT where employees use unauthorized applications, and credential theft through social engineering. Remote workers are also more vulnerable to man-in-the-middle attacks on public Wi-Fi. The combination of personal devices, decentralized data access, and limited IT visibility makes these threats harder to detect and contain compared to office environments.

Shadow IT occurs when employees use unauthorized applications or cloud storage without IT approval. Remote workers often turn to these tools when official systems feel inconvenient. The problem is that IT teams cannot monitor or enforce policies on applications they do not know about. Sensitive data may end up in unencrypted personal accounts or misconfigured cloud folders with public access. This creates blind spots that bypass corporate security measures and can lead to data breaches, compliance violations, and undetected malware infections.

VPNs create encrypted tunnels between remote devices and the corporate network, but they operate on a binary trust model: once connected, the user is treated as trusted. A compromised device or stolen credentials can give an attacker lateral movement across the network. VPNs also degrade performance, leading some employees to disable them. Modern approaches like Zero Trust Network Access (ZTNA) address these gaps by verifying every access request individually, regardless of location, and granting only the minimum permissions needed for each task.

Zero Trust is a security framework built on “never trust, always verify.” Unlike perimeter-based models that assume internal users are safe, Zero Trust treats every access request as potentially hostile. It requires continuous authentication, device health checks, and role-based permissions before granting access to any resource. For remote teams, this means access is granted only after verifying user identity, device compliance, and the specific resource requested. It limits damage significantly if credentials are compromised or a device is lost.

Most home networks lack corporate-grade security. Default router passwords, outdated firmware, absent firewalls, and weak Wi-Fi encryption all create openings for attackers. A compromised home network can enable man-in-the-middle attacks that intercept data between a remote worker and company systems. If family members or other devices share the same network, exposure increases further. Organizations should provide clear guidance on securing home Wi-Fi and consider solutions like Azure Virtual Desktop that keep sensitive data off local devices entirely.

Azure Virtual Desktop provides a centralized, cloud-hosted desktop environment where applications and data remain on secure Azure infrastructure rather than on employee devices. Users access a virtual workspace from any device, but sensitive data never leaves the cloud. This reduces risks from lost devices, unsecured networks, and unpatched personal laptops. IT teams maintain centralized control over access policies, software updates, and security configurations. AVD also supports multi-factor authentication and role-based access, adding protection layers that traditional remote setups often lack.

Every device an employee uses to access company data is an endpoint, and every endpoint is a potential entry point. In remote environments, devices operate outside the corporate network, often without the same monitoring and protection they would have in an office. Outdated operating systems, missing patches, and absent antivirus software all create vulnerabilities. Endpoint detection and response (EDR) tools, mobile device management (MDM), and automated patch management help organizations maintain visibility across distributed devices, reducing the risk of compromise.

Employee training is essential because human error remains the leading cause of security breaches. Remote workers face heightened exposure to phishing emails, social engineering, and unsafe data handling. Without regular training, employees may click malicious links, reuse weak passwords, or store files in unapproved locations. Effective programs should include simulated phishing exercises, clear policies on approved tools, and regular updates on emerging threats. Building security awareness into the organizational culture reduces risk more effectively than relying on technology alone.

A Managed Services Provider (MSP) brings specialized cybersecurity expertise that many internal teams lack for distributed environments. An MSP can design layered security architectures covering identity management, endpoint protection, network security, and data loss prevention. They provide continuous monitoring, threat detection, and incident response across remote endpoints. For organizations using Microsoft technologies, a partner like Intwo aligns remote work security with Azure, Microsoft 365, and modern workplace solutions, ensuring that policies are enforced consistently regardless of where employees connect from.

X
Need assistance?
Let’s connect