• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Developing Safe Remote Work Strategies for Multi-Level Access

A safer remote work strategy for multi-level access frameworks requires consistent policy behind access and credentialing controls.

October 14, 2020 Adam Forziati Leave a Comment

safe remote work strategy, multi-level access

Many companies are spending more on cloud infrastructure services than on data center hardware as they move to a cloud-first approach. But how safe are their remote work strategies overall, especially if they’re utilizing a multi-level access framework?

According to Marivi Stuchinsky, SVP, Global CTO at Technologent, many businesses are unprepared for IT hardware-related support needs, including everything from desktop and secure access to data center infrastructure and effective cloud strategies for remote work.

There’s no one size fits all for work from home technology that is simple, secure, scalable and accessible for maximum workforce productivity in the COVID-19 era.

Some facts about remote work, courtesy Technologent:

  • While 84 percent of organizations will continue with remote workforces post COVID-19, the vast majority lack cohesive technology and cyberreality strategies to support that future.
  • Remote workforce numbers will jump from 5M before the pandemic to 42M people post pandemic by 2021.
  • With 63 percent of cyber incidents caused by employee accidental disclosure via phishing scams fostering malware, companies have a major challenge of technology oversight for remote workers accessing business network assets.
  • Increasing Malware attacks related to COVID-19 cyber threat campaigns predicated on fears have made the threat landscape for business with remote workers much more difficult to navigate according to the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
  • Technology security vulnerabilities like insecure network connections, hardware , and inadequate IT support has made for easy routes into corporate networks with remote workers.
  • Security challenges are already apparent with web collaboration tools without a clear company protocol and action plan for implementation and use.
  • With the cost of a data breach increasing from $7.1 million in 2018 to $8.64 million in 2019, companies will be even more vulnerable to cyberthreats without proper planning and implementation of technology and security solutions for a viable remote workforce.
  • VDI, VPN, email, service desk, and other IT team and workforce challenges will scuttle any remote workforce permanence plans and gains if not addressed from the outset before going to scale.
  • Many company network infrastructure setups aren’t hardened for security of PCI, PII and PHI data transmission and companies have not universally implemented identity access management tools and protocols for secure remote work from home plans.
  • Network strain from increased bandwidth needs to cellular network strain where heavier use may result in quality issues for video conferencing along with remote worker broadband costs are potential challenges. While major carriers like Verizon, AT&T, and T-Mobile say their networks can handle the load, the details of how this works in the long-term are less clear.

What you can do to ensure safe work from home strategies

Technologent CTO Marivi Stuchinsky leads a global engineering team supporting Fortune 500 clients in implementation of projects covering technology, business transformation, and “as-a-service” managed services programs.

“Businesses will need a partner that can be a single point of contact for creating and executing a holistic and well thought out plan including cloud strategies, technology deployment, training, and adoption of remote workforce solutions such as VDI, VPN and SDP,” explained Stuchinsky.

“It’s critical that these edge-to-edge technology solutions reduce complexity while enabling broad remote connectivity and security that protects company assets and intellectual property.”

Michael McLaughlin, CIO, VP Technologent, says IT departments are looking for the flexibility of cloud, but a hybrid approach is more common.

Related: FBI: Be Wary of Using Hotel Wi-Fi for Remote Work

“Right now, there’s a lot of focus on cloud investments because it’s a quick way to spin-up capacity. For the most part, it also doesn’t require physical, on-site presence,” he says.

Establishing identity and credentials for access are key components of a WFH infrastructure. These really should be paid attention to.

“Hyperscale customers have the most secure environments out there; the trick isn’t ‘how do I make the cloud secure,’ because those providers are already working on that. The key is a bridge between on-premise environments & cloud environments. You need a consistent policy behind access and credentialing controls between either side for a safe remote work strategy.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Remote Work, Remote Workstation

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.