It’s an easy story. People at home, less control, more entry points and therefore more breaches. But the reality is not so transparent. Remote work amplified risk in certain areas, but it seldom created a breach on its own.
When you pull the thread, most major incidents point to a mix of long-standing gaps. Exposed credentials, weak third-party controls, misconfigured cloud services and legacy infrastructure, and yes, human error that was easier to exploit because of remote setups.
UK&I Channel Sales Manager for Scalefusion.
For business leaders, the focus shouldn’t be on debating whether remote work is to blame. Instead, hybrid work should be seen as one of several risk multipliers that require targeted, measurable fixes.
Industry reports show repeated patterns
Look at what actually drove the big incidents this year. Investigations and industry reports show repeated patterns.
Ransomware actors exploited stolen credentials, unpatched interfaces and misconfigured remote access, supply-chain weaknesses and third-party compromise cascaded into large operational outages and basic phishing remained a primary foothold.
These are not new vectors at all. They’re familiar problems made more damaging when they hit an environment where people, services and vendors are distributed.
The raw list of major breaches in 2025 highlights the variety of root causes and the frequency with which attackers combined multiple weak points to escalate access.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Remote work changed risk
Remote work changed the topology of risk. Home routers, personal devices and shadow IT create more “edges” for defenders to monitor.
At the same time, many organizations sped up cloud migration and introduced SaaS apps rapidly during and after the pandemic, often without commensurate governance.
That mismatch creates configuration drift. A cloud service set up for a small pilot becomes production, credentials proliferate, and fewer people understand the full attack surface.
Data-loss scenarios and lateral movement are easier when identity and permissions aren’t consistently enforced across cloud and on-prem systems. The 2025 industry breach analyses underscored misconfiguration and identity misuse as leading contributors.
But don’t assume every remote worker is the weak link. In several high-profile cases this year, attackers exploited vulnerabilities in vendor systems, legacy on-prem services, and industrial control interfaces that had little to do with where employees were logging in from.
In short, remote work is a factor, not a single point of failure. Treating it as the whole story will lead boards to spend the wrong money on optics rather than durable controls.
Evidence this year showed that when organizations focused on identity management, least privilege, auditability, and supplier risk management, they limited blast radius even with large remote populations.
So what should business leaders do now?
Start with four priorities that address remote-work risk while closing broader security gaps:
1. Make identity the control plane. Assume every login could be hostile. Enforce least privilege, mandatory multi-factor authentication, session monitoring and rapid credential revocation. Identity controls reduce the value of stolen credentials whether an employee is in an office or on a couch.
2. Harden third-party risk. Treat suppliers and partners as part of the extended network. Enforce minimum security baselines, require logs and incident playbooks, and run continuous verification. Many large outages in 2025 traced to supplier compromise, not a single remote worker mistake.
3. Fix configuration drift. Automate posture checks for cloud and remote access tools. A small misconfiguration left unchecked moves from a manageable issue to a full outage when attackers chain it with credential theft.
4. Measure what matters. Move beyond “remote work” debates and instrumental metrics. Time to revoke access, percent of critical systems behind MFA, vendor compliance scores, and mean time to detect. Metrics drive disciplined security spending and faster containment when incidents occur.
Finally, when presenting to a board, don’t frame resilience around “remote work caused this problem.” Remote work isn’t a single cause; it just introduces a set of challenges across people, processes, and technology.
Instead, talk about resilience in terms of systems. How the company manages risk, monitors processes, trains employees and uses tools to reduce threats. It’s about looking at the bigger picture, not pointing fingers at remote work itself.
We've listed the best virtual desktop software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://todaymegadeals.shop/news/submit-your-story-to-techradar-pro%3C/em%3E%3C/a%3E%3C/p%3E
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.