Cloud Security

Aruba Edge-to-Cloud Security Zero Trust Solution for Home Businesses

Aruba Edge-to-Cloud Security Zero Trust Solution for Home Businesses
Written by ga_dahmani
Aruba Edge-to-Cloud Security Zero Trust Solution for Home Businesses

[This is a sponsored article with Aruba and Techdata.]

When the first motion control order began in 2019, a poll showed that almost 44% of workers in Malaysia were forced to work remotely as companies had to adapt to remain relevant during the pandemic.

Today, as we transition to the “new normal,” investigate from the end of 2021 shows that at least 33% of Malaysians prefer to work remotely due to the added flexibility it brings. Some would even go so far as to quit if their job doesn’t allow them to work remotely.

However, by working outside the confines of a secure corporate network, remote workers are vulnerable to many types of cyberattacks.

Such an attack would not only spell disaster for the user, but also pose a huge security risk to the business, as valuable information can be stolen or corrupted by cybercriminals.

Here are three ways remote workers could become points of vulnerability for businesses, and how these threats can be mitigated.

1. Our personal devices lack phishing filters

In 2020 alone, 91% of cyberattacks that started with phishing were typically emails posing as legitimate entities to trick victims into clicking a download link. This link then installs malware on a user’s device.

Once the malware has been installed, it will transmit keystrokes or allow the cyber criminal to access the user’s PC to extract login credentials, which can be used to gain access to sensitive information.

These include personal information, such as customer credit card information, company intellectual property, or trade secrets.

But you may be thinking then, don’t email service providers these days have their own spam and phishing filters warning you to open certain emails?

Unfortunately, they aren’t always effective at successfully removing phishing emails that were created to specifically target a person or organization.

2. Malware spreads easily through local area networks like your home WiFi

Since remote workers often share their home networks with friends and family, it’s possible for computers that are already infected to spread malware to other devices on the same local area network (LAN).

A popular example of such a situation was the WannaCry ransomware attack in 2017. It infected other computers over a shared local area network and blocked users from accessing their devices, causing around $4 billion in damage globally. .

While most modern Windows-based PCs come with Windows Defender antivirus built-in, which can detect the most common malware, it’s still usually not enough to protect against a wide range of cyber attacks.

3. Public networks in cafes or elsewhere are prone to man-in-the-middle attacks

Remote workers accessing a company network are also at risk of having their information stolen through man-in-the-middle attacks in which cybercriminals intercept data on its way to its destination.

Once intercepted, data can be copied or corrupted. Cybercriminals often implement these types of attacks in the form of free public WiFi, tricking people into connecting to it.

However, by connecting to it, you are exposed to an unsecure and unencrypted connection that makes any type of data exchange risky.

How exactly do you protect your business from the threats mentioned above?

There are two different concepts to protect networks from cybersecurity attacks.

The first is the Zero Trust (ZT) security framework. It requires that all users, whether inside or outside the organization’s network, be continually authenticated, authorized, and validated for security configuration and posture before they are granted or maintained access to applications and data.

Traditionally, many cybersecurity approaches focus on keeping attackers out of a network. But what happens when a user has already clicked on that phishing link or unknowingly installed malware, thereby giving you access to a stranger disguised as an insider?

Always assuming the network is already compromised, ZT only grants user access within the network once they can prove they are not an attacker through strict and continuous verification.

Using access policies, you also have the ability to limit an intruder’s access once they are inside the network, preventing further compromise.

Example of how access policies are distributed / Image Credit: Aruba

Second, there is the Secure Access Services at the Edge (SASE), which is a cloud-based solution that protects new software-defined wide area network (SD-WAN) frameworks.

SASE comes with 5 core components running primarily in the cloud, including SD-WAN Service, Secure Web Gateway (SWG), Firewall as a Service (FWaaS), Cloud Access Security Broker (CASB), and Zero Trust Network Access.

Each component handles different aspects of network security, such as filtering unwanted traffic, monitoring ongoing transactions, and distributing traffic across the WAN to improve network performance.

Aruba has a solution called Edge-to-cloud security which implements the ZT and SASE architecture.

In addition to the benefits of both architectures, there are tools such as Aruba Central NetConductor to help automatically configure LAN, wireless LAN, and WAN infrastructure as well as enforce security policies. Doing so helps streamline the process when it comes to deploying a new network or registering a new device.

Plus, there’s Client Insights, which uses machine learning and AI algorithms to automatically flag and quarantine any device that’s deemed suspicious. A cybersecurity staff will have to manually resolve this.

Your business will also get the Unified Threat Management for Modern Networks solution that provides additional layers of protection against cyber attacks.


As more companies embrace remote work, it becomes increasingly crucial that they take cybersecurity seriously, as a distributed workforce means unregulated use of networks and devices.

This exposes employees, employers, the company and its stakeholders to various risks and action is often only taken when a cyber attack has taken place.

Employee productivity is something to worry about, but what if the tools and technology your workforce uses could be the threats to your job in the first place?

  • Learn more about Aruba edge-to-cloud security here.
  • You can also get Aruba solutions through Techdata Systems Sdn Bhd, one of Aruba’s official resellers. here.

About the author


Leave a Comment