• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
IT Infrastructure, Mobility, Network Security, News

What IT Leaders Need To Do To Secure Their Remote Workforce

Remote work will continue for some time, as will the inherent cybersecurity issues that come with it. IT leaders need to act now and prepare for the future.

December 8, 2020 Zachary Comeau Leave a Comment

Cybersecurity Remote Work

Millions of workers have been operating out of their homes since the spring, and many will continue to do so at least part time even after the COVID-19 pandemic is over and officials deem it safe to return to the office.

However, that rapid dispersion of the workforce largely didn’t account for cybersecurity, and IT teams had to scramble to roll out solutions that kept employees and the company secure as threat actors ramp up their attacks.

“Obviously the massive and fast shift for companies to a work-from-home posture caused quite a substantial set of new problems,”  Eric Schwake, a product marketing manager for emerging endpoints at enterprise security company Proofpoint, said via email to My TechDecisions. 

The company recently underwrote a report from the CyberRisk Alliance, and the findings and interpretation could give IT leaders the knowledge they need to support their organizations’ remote workers going forward.

The cybersecurity problem with remote work

According to the report, 92% of respondents said at least 21% of their workforce is currently remote, and 23% said at least 80% worked from home. Further, 54% said they expect to have a permanent remote workforce six months from now.

“The survey made it clear that work from home is something many organizations are going to stick with for the foreseeable future – and they are examining numerous fundamental ways to change things to increase their security posture,” Schwake says.

Respondents to the survey in both the U.S. and Europe said monitoring or enforcing risky end-user behavior was their top challenge, with securing cloud application data and preventing malware infection listed as the second biggest challenge, respectively.

Read Next: My TechDecisions Podcast Episode 76: Cybersecurity While Working at Home Due to COVID-19

The survey also queried IT leaders on their top risk factors, and respondents in the U.S. and Europe both listed malware and insecure home IT devices as the first two.

Meanwhile, U.S. professionals say phishing attacks are their third largest threat, while Europeans say insecure personal clouds round out the top three.

Risky end-user behavior could be as simple as checking email or browsing the internet – especially with employees working in isolation. Remote workers can be prime targets for social engineering attacks, Schwake says.

“Because employees feel more ‘alone’ when working from home they can become prime target for social engineering type attacks,” he says.

Combined with the inherently unsecure nature of home networks and potentially unpatched routers, there should be a greater emphasis on securing the remote workforce, Schwake says.

What IT leaders are doing to secure their remote workforce and plan for the future

Corporate-owned devices can still be secured with tools like endpoint security and VPN tools, but personal devices being used for work are difficult for IT departments to secure.

“If the employees are using their own devices we have seen organizations try and enforce various security controls such as enhanced email security and also agentless secure access solutions,” Schwake says.

“Beyond that, employee education has become more important to teach them about the risks of working from home so that they can become part of the solution when potentially encountering security threats.”

According to Schwake, IT leaders want solutions that can protect their end users regardless of the device their using, tools to monitor end users to ensure corporate data can’t be compromised, and methods to scale their architecture to ensure users have access to corporate data regardless of their network or device.

This includes things like:

• Increasing their email security
• Implementing remote browser isolation
• Implementing a virtual private network (VPN)
• Going to a fully Zero Trust framework
• Increase compliance measures
• End user education

As remote work continues to permeate the corporate world, organizations are rethinking their infrastructure to ensure that they can maintain business continuity, as half of respondents said they will adopt more robust business continuity and digital transportation programs, and nearly half said they plan to implement a Zero Trust framework going forward.

IT leaders should learn from the events of this year and ensure their organizations are prepared as much as possible for a similar situation in the future.

“Ensuring employees have secure and scalable access is a requirement to ensure a high level of employee productivity in even the most extreme circumstances,” Schwake says.

“Having a plan in place and implemented will help prevent many of the headaches that this pandemic has caused for organizations around the world.”

Tagged With: COVID-19, Cybersecurity, Hybrid Work, Remote Work

Related Content:

  • Google Password Manager Google Updates Password Manager For Unified Experience
  • VMware vSphere+ vSAN+ VMware Releases vSphere+ and vSAN+ to Enhance On…
  • Microsoft Cybersecurity Architect Expert Microsoft Adds New Expert-level Cybersecurity Architect Certification
  • Microsoft Basic Auth Prepare: Microsoft Begins Disabling Basic Auth in Exchange…

Free downloadable guide you may like:

  • Uber Advanced Technologies Group Drives its Business Forward

    The guiding principle for the new Uber meeting room redesign was “invisible comfort” to ensure that everyone could maximize productivity.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Uber Advanced Technologies Group Drives its Business Forward

The guiding principle for the new Uber meeting room redesign was “invisible comfort” to ensure that everyone could maximize productivity.

Windows 11
Blueprint Series: Upgrading to Windows 11

Upgrading end users to Windows 11 could be one of the most challenging tasks IT has to face in the coming years. Although the new version is touted...

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.