There are three key statements enterprises must consider in order to move forward in protecting corporate resources from leakage and attack:
The perimeter has disappeared.
Legacy security technologies do not apply.
Devices cannot be trusted.
As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Post-perimeter security.
Your perimeter has disappeared
Work has fundamentally changed. Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world. For example, employees don’t often have to connect to a VPN in order to check their work email or view/download sensitive documents on the go.
Attacks like phishing have also evolved to take advantage of the fact that perimeter security no longer applies. Corporate devices are personal now, as well. Social media apps, messaging apps, and others create an environment where employees can be phished and corporate credentials stolen through personal activities. Year-to-date in 2018, 50.8% of Lookout users with Safe Browsing turned on encountered a phishing link.