Skip to main content
  • Foundation
  • Executive network
  • CEO Circle
  • Enterprise Solutions
  • Linkage Logo
  • Store
  • Sign In
  • Account
    • My Account
    • Logout
    • Global
    • India
    • MENA
SHRM
About
Book a Speaker
Join Today
Renew
Rejoin Now
Renew
  • Membership
  • Certification
    Certification

    Smiling asian student studying in library with laptop books doing online research for coursework, making notes for essay homework assignment, online education e-learning concept
    Get Certified!

    Be recognized as an HR leader with your SHRM-CP or SHRM-SCP credential.

    • How to Get Certified

      Demonstrate your ability to apply HR principles to real-life situations. No other HR certification compares.

      • How to Get Certified
      • Eligibility Criteria
      • Exam Details and Fees
      • SHRM-CP
      • SHRM-SCP
      • Which Certification is Best for Me
      • Certification FAQs
    • Prepare for the Exam

      Give yourself the best chance to pass your SHRM certification exam.

      • Exam Preparation
      • SHRM BASK
      • SHRM Learning System
      • Instructor-Led Learning
      • Self-Study
      • Study Aids & Add-ons
    • Recertification

      Recertify your SHRM Credentials before your end date!

      • Specialty Credentials
      • Qualifications
  • Topics & Tools
    Topics & Tools

    Stay up to date with workplace news and leverage our vast library of resources to streamline day-to-day HR tasks.

    The white house in washington, dc.
    Executive Order Impact Zone

    Do not abandon, but evaluate and evolve. It is about legal, equal opportunity for all.

    • News & Trends

      Follow breaking news and emerging workplace trends.

      Legal & Compliance

      Stay informed on workplace legal updates and their impacts.

      From the Workplace

      Explore diverse perspectives from your peers on today's workplaces.

      Flagships

      Get curated collections of podcasts, videos, articles, and more produced by SHRM.

    • HR Topics
      • AI in the Workplace
      • Civility at Work
      • Compensation & Benefits
      • Inclusion & Diversity
      • Talent Acquisition
      • Workplace Technology
      • Workplace Violence Prevention
      SEE ALL
      SHRM Research
    • Tools & Samples

      Access member resources and tools to streamline HR tasks.

      • Forms & Checklists
      • How-To Guides
      • Interactive Tools
      • Job Descriptions
      • Policies
      • Toolkits
      SEE ALL
      Ask an Advisor
  • Events & Education
    Events & Education

    SHRM25 in San Diego, June 29 - July 2, 2025
    Join us for SHRM25 in San Diego

    Register for the World’s Largest HR Conference being held on June 29 - July 2, 2025

    • Events
      • SHRM25
      • The AI+HI Project 2025
      • INCLUSION 2025
      • Talent 2026
      • Linkage Institute 2025
      SEE ALL
      Webinars
    • Educational Programs

      Designed and delivered by HR experts to empower you with the knowledge and tools you need to drive lasting change in the workplace.

      Specialty Credentials

      Demonstrate targeted competence and enhance credibility among peers and employers.

      Qualifications

      Gain a deeper understanding and develop critical skills.

    • Team Training & Development

      Customized training programs unique to your organization’s needs.

  • Business Solutions
  • Advocacy
    Advocacy

    Make your voice heard on public policy issues impacting the workplace.

    Advocacy
    SHRM's President & CEO testifies to Congress on "The State of American Education"
    • Policy Areas
      • Workforce Development
      • Workplace Inclusion
      • Workplace Flexibility & Leave
      • Workplace Governance
      • Workplace Health Care
      • Workplace Immigration
      State Affairs

      SHRM advances policy solutions in state legislatures nationwide.

      Global Policy

      SHRM is the go-to for global HR leaders and businesses on workplace matters.

    • Advocacy Team (A-Team)

      SHRM’s A-Team is a key member benefit, giving you the tools, insights, and opportunities to shape workplace policy and drive real impact.

      Take Action

      Urge lawmakers to support policies that create lasting, positive change.

      Advocacy & Legislative Resources

      Access SHRM’s curated policy materials and content.

    • SHRM-Led Coalitions
      • Generation Cares
      • The Section 127 Coalition
      • Learn More & Partner with SHRM Government Affairs
  • Community
    Community

    Woman raising hand in group
    Find a SHRM Chapter

    Easily find a local professional or student chapter in your area.

    • Chapters

      Find local connections from over 607 chapters and state councils and create your personalized HR network.

      SHRM Connect

      Post polls, get crowdsourced answers to your questions and network with other HR professionals online.

      SHRM Northern California

      Join SHRM members in the greater San Francisco Bay area for local events and networking.

    • Membership Councils

      Learn about SHRM's five regional councils and the Membership Advisory Council (MAC).

      • Membership Advisory Council
      • Regional Councils
    • Volunteers

      Learn about volunteer opportunities with SHRM.

      • Volunteer Leader Resource Center
Close
  • Membership
  • Certification
    back
    Certification
    Smiling asian student studying in library with laptop books doing online research for coursework, making notes for essay homework assignment, online education e-learning concept
    Get Certified!

    Be recognized as an HR leader with your SHRM-CP or SHRM-SCP credential.

    • How to Get Certified

      Demonstrate your ability to apply HR principles to real-life situations. No other HR certification compares.

      • How to Get Certified
      • Eligibility Criteria
      • Exam Details and Fees
      • SHRM-CP
      • SHRM-SCP
      • Which Certification is Best for Me
      • Certification FAQs
    • Prepare for the Exam

      Give yourself the best chance to pass your SHRM certification exam.

      • Exam Preparation
      • SHRM BASK
      • SHRM Learning System
      • Instructor-Led Learning
      • Self-Study
      • Study Aids & Add-ons
    • Recertification

      Recertify your SHRM Credentials before your end date!

      • Specialty Credentials
      • Qualifications
  • Topics & Tools
    back
    Topics & Tools

    Stay up to date with workplace news and leverage our vast library of resources to streamline day-to-day HR tasks.

    The white house in washington, dc.
    Executive Order Impact Zone

    Do not abandon, but evaluate and evolve. It is about legal, equal opportunity for all.

    • News & Trends

      Follow breaking news and emerging workplace trends.

      Legal & Compliance

      Stay informed on workplace legal updates and their impacts.

      From the Workplace

      Explore diverse perspectives from your peers on today's workplaces.

      Flagships

      Get curated collections of podcasts, videos, articles, and more produced by SHRM.

    • HR Topics
      • AI in the Workplace
      • Civility at Work
      • Compensation & Benefits
      • Inclusion & Diversity
      • Talent Acquisition
      • Workplace Technology
      • Workplace Violence Prevention
      SEE ALL
      SHRM Research
    • Tools & Samples

      Access member resources and tools to streamline HR tasks.

      • Forms & Checklists
      • How-To Guides
      • Interactive Tools
      • Job Descriptions
      • Policies
      • Toolkits
      SEE ALL
      Ask an Advisor
  • Events & Education
    back
    Events & Education
    SHRM25 in San Diego, June 29 - July 2, 2025
    Join us for SHRM25 in San Diego

    Register for the World’s Largest HR Conference being held on June 29 - July 2, 2025

    • Events
      • SHRM25
      • The AI+HI Project 2025
      • INCLUSION 2025
      • Talent 2026
      • Linkage Institute 2025
      SEE ALL
      Webinars
    • Educational Programs

      Designed and delivered by HR experts to empower you with the knowledge and tools you need to drive lasting change in the workplace.

      Specialty Credentials

      Demonstrate targeted competence and enhance credibility among peers and employers.

      Qualifications

      Gain a deeper understanding and develop critical skills.

    • Team Training & Development

      Customized training programs unique to your organization’s needs.

  • Business Solutions
  • Advocacy
    back
    Advocacy

    Make your voice heard on public policy issues impacting the workplace.

    Advocacy
    SHRM's President & CEO testifies to Congress on "The State of American Education"
    • Policy Areas
      • Workforce Development
      • Workplace Inclusion
      • Workplace Flexibility & Leave
      • Workplace Governance
      • Workplace Health Care
      • Workplace Immigration
      State Affairs

      SHRM advances policy solutions in state legislatures nationwide.

      Global Policy

      SHRM is the go-to for global HR leaders and businesses on workplace matters.

    • Advocacy Team (A-Team)

      SHRM’s A-Team is a key member benefit, giving you the tools, insights, and opportunities to shape workplace policy and drive real impact.

      Take Action

      Urge lawmakers to support policies that create lasting, positive change.

      Advocacy & Legislative Resources

      Access SHRM’s curated policy materials and content.

    • SHRM-Led Coalitions
      • Generation Cares
      • The Section 127 Coalition
      • Learn More & Partner with SHRM Government Affairs
  • Community
    back
    Community
    Woman raising hand in group
    Find a SHRM Chapter

    Easily find a local professional or student chapter in your area.

    • Chapters

      Find local connections from over 607 chapters and state councils and create your personalized HR network.

      SHRM Connect

      Post polls, get crowdsourced answers to your questions and network with other HR professionals online.

      SHRM Northern California

      Join SHRM members in the greater San Francisco Bay area for local events and networking.

    • Membership Councils

      Learn about SHRM's five regional councils and the Membership Advisory Council (MAC).

      • Membership Advisory Council
      • Regional Councils
    • Volunteers

      Learn about volunteer opportunities with SHRM.

      • Volunteer Leader Resource Center
Join Today
Renew
Rejoin Now
Renew
  • Store
    • Global
    • India
    • MENA
  • About
  • Book a Speaker
  • Foundation
  • Executive network
  • CEO Circle
  • Enterprise Solutions
  • Linkage Logo
SHRM
Sign In
  • Account
    • My Account
    • Logout
Close

  1. Topics & Tools
  2. Workplace News & Trends
  3. All Things Work
  4. Strengthening Cybersecurity in a Hybrid Work Era
Share
  • Linked In
  • Facebook
  • Twitter
  • Email

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vivamus convallis sem tellus, vitae egestas felis vestibule ut.


Error message details.

Copy button
Reuse Permissions

Request permission to republish or redistribute SHRM content and materials.


Learn More
Feature

Strengthening Cybersecurity in a Hybrid Work Era

The world of hybrid work demands better security.

October 22, 2021 | Tam Harbert

It didn't take long for cybercriminals to use the global pandemic to their advantage. One e-mail scam promised money from a COVID-19 "global empowerment fund" if recipients provided their bank account information. Another offered loans from the U.S. Small Business Administration for pandemic relief and included a malicious link to a spoofed SBA website that stole users' credentials. Still another promised early access to vaccines and stole personally identifiable information. Cybersecurity company Proofpoint reported that by mid-March 2020, 80 percent of all threats it scanned each day referenced COVID-19.

"Adversaries love chaos, and this was a time of chaos," says Emily Mossburg, Deloitte's global cyber leader. For organizations that rushed to enable employees to work from home, "they changed the landscape of their technology footprint drastically and very rapidly, with a focus on keeping the lights on and keeping business afloat." That sometimes meant taking shortcuts on security.

Tightening Cybersecurity for Hybrid Workforces

The world of hybrid work demands better security. "As we move to work anytime from anywhere, organizations should ensure that they have built-in security at the foundation," Mossburg says. In particular, organizations need to effectively secure endpoints—all those mobile phones, laptops and other devices employees use to connect and work from places other than an office

Technology is important, but the old expression that "humans are the weakest link" in any cybersecurity program seems truer than ever. Employee training is a critical line of defense as cybercriminals continue to prey on remote workers. "The easiest way into an organization is by tricking an employee to let you in." says Tim Sadler, CEO of cybersecurity company Tessian.

A Tessian survey found that 88 percent of data breaches involved human error.

And in a hybrid work environment, employees may pay less heed to the rules or simply be more likely to make mistakes since they're not in a formal office, especially if they're juggling family and other demands. In the Tessian survey, 43 percent of employees said they have made mistakes at work that compromised cybersecurity; 58 percent admitted having sent a company e-mail to the wrong person, often because they were distracted or tired.

"Every CISO [chief information security officer] I've spoken to is wondering what work-from-home means in terms of security, when there is zero distance between the office, the living room and the kitchen," says Robert Holmes, Proofpoint's vice president and general manager of email fraud defense.

To that end, executives would do well to encourage more cooperation between the technology side of the house and the people side. "This is an area where there's a huge opportunity for the CHRO [chief human resource officer] and the CISO to have a strong relationship," Mossburg says. First, they can team up on training programs to increase security awareness. Second, the CISO can help HR strengthen practices, processes and systems to ensure the security of employee data in distributed work environments.

 

 


The Cost of Cybercrime on Businesses

Cybersecurity has become more urgent as the pandemic spurred a flood of social engineering attacks playing on people's uncertainty and fear. The result was not only an increase in the number of attacks but also substantially higher financial losses

Complaints to the FBI's Internet Crime Complaint Center were up 69 percent in 2020, claiming a total of $4.2 billion in losses, up from $3.5 billion in 2019.

The costliest type of attack was "business e-mail compromise" (when criminals send an e-mail message that appears to come from a known source making a legitimate request), which made up 43 percent—$1.8 billion—of the total losses. Phishing scams also rose dramatically. The amount paid in ransomware attacks rose in 2020 by more than 300 percent to $350 million, according to a report from the Ransomware Task Force, a team of experts from business, government and academia.

The cost of each individual data breach, on average, is also up. According to the Cost of a Data Breach Report 2021 by the Ponemon Institute and IBM Security, the average cost of a breach rose 10 percent, to $4.24 million.

The breach of customer personally identifiable information (PII) is the most expensive type of breach—at $180 per record—and it gets the most attention. But the breach of employee PII runs a close second—at $176 per record—and probably does as much damage as customer data breaches. Employee PII theft not only impacts individual workers but also saps company morale and can hurt worker retention and recruitment.

These breaches also supply cybercriminals with a treasure trove of data to use in other crimes down the road. With employee data, criminals can target individuals in ransomware attacks by, for example, encrypting all the data on their hard drive and demanding money to send the encryption key, says Larry Ponemon, founder and chairman of the Ponemon Institute, a research organization in Traverse City, Mich. An even more serious potential follow-up crime occurs when hackers use stolen information to impersonate employees and gain access to an organization's network.

 



The High Stakes of Credential Theft in Cybersecurity

The 2021 Data Breach Investigations Report from Verizon found that 61 percent of all breaches involved the theft of credentials, such as usernames and passwords. Credential phishing accounted for two-thirds of all malicious messages tracked by Proofpoint in 2020.

"Credentials are gold because criminals can use them in so many ways," Holmes says.

For one thing, these individuals can make cyberattacks less scattershot and more targeted. Take ransomware, for example. Two to three years ago, the most common ransomware crimes were "first-stage" attacks, Holmes says. In these attacks, hackers use botnets to send out millions of e-mails, hoping potential victims will click on the link. When the recipients do, the attacker encrypts the hard drive on their computers and holds their data for ransom.

Today, attacks are multistage. The bad guys do their research, identifying who might have privileged access—an IT manager, for example, or maybe the CFO—that permits them to access sensitive data. The hackers then target that person with a phishing e-mail that, when clicked, steals their credentials. "Now the cyber criminals can log in and do deeper reconnaissance," Holmes says. "They can see what's in that person's inbox or on their calendar. They can access the SharePoint server and discover the organization's vulnerability, then lock up all the data for ransom."

Criminals can also use the hacked account to send employees very convincing phishing e-mails that appear to come directly from company officials. In a recent case, an employee was convinced an e-mail was valid because it referenced the fact that the sender coached the employee's kid's soccer team, Holmes says. But the fraudster could easily find such personal information if he had the sender's credentials and had read e-mails in the "sent" folder.

Innovating Cybersecurity Training for Modern Threats

The vulnerability of humans to such social engineering attacks, and the waves of subsequent attacks that can follow, make cybersecurity training more important than ever. And it's no longer one-size-fits-all

"Some general broad training on the topic is important, but then target the training based on the role that an employee plays in the organization and how a cybercriminal might target them," Mossburg says. An IT systems administrator might get a tech-related phishing e-mail that lays out some believable reasons for needing to access credentials, while someone in accounts payable is more likely to get an e-mail about a wire transfer.

Mastercard has a dedicated team specifically focused on reducing human cybersecurity risk through education and training. "We use the concept of 'all, some and few,' " says Jon Brickey, senior vice president and cybersecurity evangelist for operations and technology. " 'All' employees need a base line of awareness, like 'don't click on links in e-mails that look phishy.' Then there's 'some'—for example, a software developer needs special training in how to write secure code. Then we have the 'few'—those who need very specific training and certification, such as penetration testers."

To make security-awareness training more engaging, Mastercard runs a virtual escape room. Similar to real-life escape room games, employees work in teams, finding and piecing together security-related tips to build a key that enables them to unlock the door and free themselves. For example, they may call out a password left on a note or a sensitive document left open on a monitor.

"This makes training fun and also helps employees to apply what they're learning," Brickey says. "You can't just shove slides at people and expect them to absorb the material and change their behaviors."

In fact, training has become more interactive, engaging and effective over the last few years, Ponemon says. "Some security vendors provide simulations so real that you forget you're in a class," he notes. Such experiential learning tends to put the lessons into context and make them stick.

 


Cybersecurity Tips for Executives

  • Get involved. Senior executives actively involved in cybersecurity are in the minority, says Larry Ponemon, founder and chairman of the Ponemon Institute, a research organization. "The vast majority of C-level people don't see security as an issue … that impacts their job or their position as a leader in the organization," he says. That needs to change.
  • Follow good security practices. It's important for executives not only to invest money in security technology, policies and training but also to be invested themselves in security practices. "There are so many organizations where senior management pays lip service to security then works on their own unsecured personal laptops," says Tim Sadler, CEO of cybersecurity company Tessian. Beyond modeling the right behavior, executives can single-handedly protect the business. "Executives are the most targeted people in any organization, because they have access to the most sensitive data," he says. "Hackers know if they hit an executive's e-mail, they've hit the jackpot."
  • Hire an interpreter. Lack of executive interest and involvement in cybersecurity is partly because the topic can get very technical, very quickly. "Security can be so cryptic and hard to understand," says Ponemon. He recommends hiring people who can "translate the gobbledygook into something people can generally understand." This might be a sort of deputy to the CISO [chief information security officer], who serves as interpreter both to executive management and to the rank-and-file employees.
  • Keep communication channels direct, open and clear. Ponemon knows of cases where a cyberattack that began in one part of a company spread to the entire organization simply because of lack of communication. "There can be a lot of turf issues," he says, which in the case of a cyberattack can lead to multimillion-dollar losses as the attack spreads.
  • Customize your security plan and your training. Beyond tightening cybersecurity overall, investigate and plan for the kinds of attacks most likely to hit your type of organization and industry, who would be targeted, and how such attacks would likely impact your operations. Then prioritize protection from those "high-risk, high-priority scenarios," says Emily Mossburg, Deloitte's global cyber leader. "You don't want to track everything with the same level of rigor," she advises. "You'll exhaust yourself and you'll run out of money."
  • Foster cooperation between IT security and HR. By working together, these departments can improve data security practices, especially in handling employee personally identifiable information, and produce more effective training. In fact, they might provide someone to play the role of interpreter that Ponemon recommends. HR, IT and communications staff work together in Mastercard's human risk reduction program, says Jon Brickey, senior vice president at Mastercard. HR ensures compliance with workplace and workforce regulations and works with the communications department to explain cybersecurity policies—and the logic behind them—to staff. —T.H.

 

What's Your Cybersecurity IQ?

Some employers have started rating employees on how well they absorb and apply their cybersecurity training. Last year, as the COVID-19 pandemic disrupted the workplace, Mastercard introduced a "SecurIT" score for each employee, Brickey says. The score comprises multiple metrics, such as how often the employee clicked on a link in a phishing simulation. If an employee has a low SecurIT score, that might trigger remedial training or even a discussion with their manager. The scores "help us to understand what the human risk is at Mastercard," Brickey says. "It's like a credit score, except for security behavior."

Cybersecurity IQs of individuals are important measurements, Holmes says, but he wants companies to build on that by combining them with other data. Proofpoint uses a construct in which it identifies which people are the most vulnerable (low scores), which people are the most frequently attacked and which people have privileged access.
"Imagine the intersection of those three circles. In the center is the perfect storm: a link-clicker who is frequently targeted and has privileged-access credentials," Holmes says. 

By identifying who falls into that category, companies can provide more training to those specific people and tighten technical safeguards—like putting more controls in place to catch more potential phishing attempts. "That is where the next generation of security is headed," Holmes says.

Sadler adds that cybersecurity IQ scores should be updated regularly with new test results, and programs adjusted accordingly. "You can't just do it once a year," he says.

As companies adjust cybersecurity practices to protect them in a hybrid-work world, executives should remember that it's a process of continuous improvement, Mossburg says. She's had executives ask her whether a cybersecurity program was finished. "The bottom line is: You are never done," she says, explaining that organizations may need an initiative that focuses on closing security gaps, but they should always be embedding security awareness throughout the business. "Cybersecurity needs to become part of the fabric of the organization."

Tam Harbert is a freelance technology and business reporter based in the Washington, D.C., area.


Explore Further

SHRM provides advice and resources to help business leaders safeguard their organizations against cyberthreats.

Data Breach Report Emphasizes Cybersecurity's Human Element
For all the millions of dollars an organization might spend on security technology, employees' decisions and actions do the most to keep the company safe.

Taking a People-First Approach to Data Security
Despite years of exhortations to employees from IT and HR departments to take steps to protect data and systems, breaches still occur. What are organizations doing about data security to achieve better results?

Help Employees Understand the Importance of Cybersecurity
A personal cyberattack on an employee can create a huge burden for the organization—sidelining the individual for hours or days and potentially requiring security and IT support from the employer. What can and should you do to help prevent such a scenario?

The Cybersecurity Challenge
With cyberthreats growing in sophistication, organizations will have to up their game by deploying significant and wide-ranging organizational defenses.

 

Subscribe to the All Things Work Newsletter

 

Data Security
Risk Management
Technology
Workplace Security

Related Articles

Kelly Dobbs Bunting speaks onstage at SHRM24
(opens in a new tab)
News
Why AI+HI Is Essential to Compliance

HR must always include human intelligence and oversight of AI in decision-making in hiring and firing, a legal expert said at SHRM24. She added that HR can ensure compliance by meeting the strictest AI standards, which will be in Colorado’s upcoming AI law.

(opens in a new tab)
News
A 4-Day Workweek? AI-Fueled Efficiencies Could Make It Happen

The proliferation of artificial intelligence in the workplace, and the ensuing expected increase in productivity and efficiency, could help usher in the four-day workweek, some experts predict.

(opens in a new tab)
News
How One Company Uses Digital Tools to Boost Employee Well-Being

Learn how Marsh McLennan successfully boosts staff well-being with digital tools, improving productivity and work satisfaction for more than 20,000 employees.

HR Daily Newsletter

Stay up to date with the latest HR news, trends, and expert advice each business day.

Success title

Success caption

Manage Subscriptions
  • About SHRM
  • Careers at SHRM
  • Press Room
  • Contact SHRM
  • Book a SHRM Executive Speaker
  • Advertise with Us
  • Partner with Us
  • Copyright & Permissions
  • Post a Job
  • Find an HR Job
Follow Us
  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • SHRM Newsletters
  • Ask An Advisor

© 2025 SHRM. All Rights Reserved

SHRM provides content as a service to its readers and members. It does not offer legal advice, and cannot guarantee the accuracy or suitability of its content for a particular purpose. Disclaimer


  1. Privacy Policy

  2. Terms of Use

  3. Accessibility

Join SHRM for Exclusive Access to Member Content

SHRM Members enjoy unlimited access to articles and exclusive member resources.

Already a member?
Free Article
Limit Reached

Get unlimited access to articles and member-exclusive resources.

You've reached the limit of 1 free article this month. Join to access unlimited articles and member-only resources.

Already a member?
Free Article
Exclusive Executive-Level Content

This content is for the SHRM Executive Network and Executive Content Subscription members only.

You've reached the limit of 1 free article this month. Join the Executive Network and enjoy unlimited content.

Already a member?
Free Article
Exclusive Executive-Level Content

This content is for the SHRM Executive Network and Executive Content Subscription members only.

You've reached the limit of 1 free article this month. Join and enjoy unlimited access to SHRM Executive Network Content.

Already a member?
Unlock Your Career with SHRM Membership

Please enjoy this free resource! Join SHRM for unlimited access to exclusive articles and tools.

Already a member?

Your membership is almost expired! Renew today for unlimited access to member content.

Renew now

Your membership has expired. Renew today for unlimited access to member content.

Renew Now

Your Executive Network membership is nearing its expiration. Renew now to maintain access.

Renew Now

Your membership has expired. Renew your Executive Network benefits today.

Renew Now