• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Safeguarding Your Mobile Workforce Data Security in 4 Steps

Businesses are allowing employees to WFH even after the COVID-19 pandemic subsides. Here are four measures to ensure mobile workforce data security.

October 8, 2020 TechDecisions Staff Leave a Comment

mobile workforce data security

Research firm Gartner has found that, after the COVID-19 pandemic subsides, businesses will face a new kind of challenge: managing their mobile workforce data security.

According to Gartner survey, 82% of business leaders plan to let employees continue to work from home in at least some capacity, while 47% plan to allow employees to do so permanently.

Major banks — including JP Morgan and Barclays — and technology companies like Google, Twitter, Facebook and Square are just some of the organizations that have embraced remote work as part of their business models.

In fact, businesses large and small across a wide range of industries can be expected to permanently adopt WFH practices.

Remote Work & Cloud Security

Temporary or not, the shift to remote work has caused lasting changes to the way people work. Even companies that are going back to having an office presence have developed WFH practices and will continue to enhance them, whether by hiring more remote employees, retaining employees who move out of town, or even shifting entirely and permanently to remote work.

More employees working from home means more devices are connecting remotely, i.e. outside of the secured corporate network. As a result, businesses’ control over data is slipping rapidly. This is why it’s so critical to understand what remote workers are doing with that data and rework the new “normal” to make it more effective and secure.

It’s time for organizations to get serious about implementing the security measures necessary not only for securing remote edge devices and entry points, but also to make these measures part of a unified, comprehensive strategy. All of this forms a single, integrated security framework designed to simplify management and expand visibility and control.

Fortunately, most organizations now have the data and know-how necessary to understand how remote work impacts their applications, life cycle, and IT infrastructure, as well as its effect on traffic to applications that are located on-premises and in the Cloud.

The future of work from home security

The consequences of poor cybersecurity hygiene while working remotely can include anything from compromised sensitive data to unauthorized access to the organization’s infrastructure.

Secure communications while working remotely can be ensured by the combination of technical solutions and controls with proper employee operations security (OPSEC).

Typically, when it comes to securing your teleworkers, the first item on the agenda is developing a corporate policy.

Related: What Power Management Solutions Can Do for Your Mobile Workforce

This policy should outline what’s acceptable in a remote working environment, how data is handled, what levels of authorization are available, etc.

Risk-based decisions can also be made depending on the types of devices employees use for teleworking (for example, company-issued devices, personal laptops or smartphones, etc.). Devices that haven’t been issued specifically by the company should be subject to more stringent controls.

Organizations should take these steps to maintain mobile workforce data security:

  1. Content storage should be allowed in the Cloud only. Use Cloud- or web-based storage software that allows for sharing and editing of documents (for example, Cisco Cloudlock).
  1. Endpoint security using two-factor authentication. This adds a second layer of security when logging in to important applications. Multi-factor authentication uses OTP (one-time password) technology, certificate-based USB tokens, smart cards, and additional advanced security technologies.
  1. Any connections to the company’s network should be performed through a VPN (Virtual Private Network), which uses either SSL (Secure Sockets Layer) or IPsec (Internet Protocol Security) to encrypt communications from the remote worker’s machine; This safeguards both the end user and corporate environment, ensuring that no one is able to decipher sensitive data traffic.
  1. Risk management contingency plan. It’s essential to have the possibility to either track a laptop or wipe it remotely in case a remote worker loses a laptop with sensitive business information on it.

Security teams have to develop new policies to respond to these challenges. Some of them have already done so, but their work doesn’t end there. They need to communicate those new policies to the entire workforce and train employees on how those changes affect them.

Combining remote workers with Cloud infrastructures can present numerous business opportunities. But without the right cybersecurity and operational framework, the Cloud presents serious challenges that can have far-reaching repercussions.


Juta Gurinaviciute is Chief Technology Officer at NordVPN Teams. This story premiered on our sister site, Security Sales & Integration.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Data Security, Mobile, Remote Work

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.