• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Developing Safe Remote Work Strategies for Multi-Level Access

A safer remote work strategy for multi-level access frameworks requires consistent policy behind access and credentialing controls.

October 14, 2020 Adam Forziati Leave a Comment

safe remote work strategy, multi-level access

Many companies are spending more on cloud infrastructure services than on data center hardware as they move to a cloud-first approach. But how safe are their remote work strategies overall, especially if they’re utilizing a multi-level access framework?

According to Marivi Stuchinsky, SVP, Global CTO at Technologent, many businesses are unprepared for IT hardware-related support needs, including everything from desktop and secure access to data center infrastructure and effective cloud strategies for remote work.

There’s no one size fits all for work from home technology that is simple, secure, scalable and accessible for maximum workforce productivity in the COVID-19 era.

Some facts about remote work, courtesy Technologent:

  • While 84 percent of organizations will continue with remote workforces post COVID-19, the vast majority lack cohesive technology and cyberreality strategies to support that future.
  • Remote workforce numbers will jump from 5M before the pandemic to 42M people post pandemic by 2021.
  • With 63 percent of cyber incidents caused by employee accidental disclosure via phishing scams fostering malware, companies have a major challenge of technology oversight for remote workers accessing business network assets.
  • Increasing Malware attacks related to COVID-19 cyber threat campaigns predicated on fears have made the threat landscape for business with remote workers much more difficult to navigate according to the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
  • Technology security vulnerabilities like insecure network connections, hardware , and inadequate IT support has made for easy routes into corporate networks with remote workers.
  • Security challenges are already apparent with web collaboration tools without a clear company protocol and action plan for implementation and use.
  • With the cost of a data breach increasing from $7.1 million in 2018 to $8.64 million in 2019, companies will be even more vulnerable to cyberthreats without proper planning and implementation of technology and security solutions for a viable remote workforce.
  • VDI, VPN, email, service desk, and other IT team and workforce challenges will scuttle any remote workforce permanence plans and gains if not addressed from the outset before going to scale.
  • Many company network infrastructure setups aren’t hardened for security of PCI, PII and PHI data transmission and companies have not universally implemented identity access management tools and protocols for secure remote work from home plans.
  • Network strain from increased bandwidth needs to cellular network strain where heavier use may result in quality issues for video conferencing along with remote worker broadband costs are potential challenges. While major carriers like Verizon, AT&T, and T-Mobile say their networks can handle the load, the details of how this works in the long-term are less clear.

What you can do to ensure safe work from home strategies

Technologent CTO Marivi Stuchinsky leads a global engineering team supporting Fortune 500 clients in implementation of projects covering technology, business transformation, and “as-a-service” managed services programs.

“Businesses will need a partner that can be a single point of contact for creating and executing a holistic and well thought out plan including cloud strategies, technology deployment, training, and adoption of remote workforce solutions such as VDI, VPN and SDP,” explained Stuchinsky.

“It’s critical that these edge-to-edge technology solutions reduce complexity while enabling broad remote connectivity and security that protects company assets and intellectual property.”

Michael McLaughlin, CIO, VP Technologent, says IT departments are looking for the flexibility of cloud, but a hybrid approach is more common.

Related: FBI: Be Wary of Using Hotel Wi-Fi for Remote Work

“Right now, there’s a lot of focus on cloud investments because it’s a quick way to spin-up capacity. For the most part, it also doesn’t require physical, on-site presence,” he says.

Establishing identity and credentials for access are key components of a WFH infrastructure. These really should be paid attention to.

“Hyperscale customers have the most secure environments out there; the trick isn’t ‘how do I make the cloud secure,’ because those providers are already working on that. The key is a bridge between on-premise environments & cloud environments. You need a consistent policy behind access and credentialing controls between either side for a safe remote work strategy.”

Tagged With: Remote Work, Remote Workstation

Related Content:

  • 1E Patch Insights, Patch Management, Software update 1E Releases Patch Insights to Augment Microsoft Patching…
  • Google AI Investment, Anthropic, OpenAI, ChatGPT Google Makes Key AI Investment as Microsoft Begins…
  • AVer CAM550 and VB342 Pro Certified for Microsoft Teams AVer CAM550, VB342 Pro 4K PTZ Cameras Certified…
  • Xilica Sennheiser small room kit Xilica, Sennheiser Add Small Room Audio Kits for…

Free downloadable guide you may like:

  • Blueprint Series Cover: What works for hybrid workBlueprint Series: What Works for Hybrid Work

    Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Guide to creating a ransomware response plan download
Blueprint Series: Creating a Ransomware Response Plan

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and a...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.