The pandemic made organizations realize that effective cyber defenses should support anyone anywhere. Studies indicate that more companies will move to flexible infrastructures to adapt to any situation. In this article at IT Business Edge, Llanor Alleyne shares how organizations can take care of WFH cybersecurity and, thereby, their remote workforce.
WFH Cybersecurity Protocols
Leaders across 17 countries responded to the 2020 Remote Workforce Cybersecurity Report. The focus areas in the reports convey:
- Only 40 percent of companies had business continuity plans before the pandemic. So, 83 percent of the organizations find the drastic shift to the remote work model challenging.
- Cyber hackers are now targeting the distributed workforce because employees are forced to work outside the corporate network’s security. 60 percent reported a rise in breaches during the move.
- Perimeter security is not secure enough, so companies must regularly revisit their cybersecurity roadmap and contingency plans. Understand how dynamic the attack vectors have become and proactively seek to identify network vulnerabilities.
- Tailor WFH cybersecurity per the usage—basic, power, and super. The basic user would need access to only emails, collaboration tools, basic file sharing apps, etc. A power user can access confidential data while a superuser has privileged system access.
- Update remote employees about cybersecurity best practices like multi-factor authentication (MFA), network access control (NAC), software-defined wide area networking (SD-WAN), and intent-based segmentation. 73 percent of organizations will invest further in training their IT security professionals.
- Train remote staff to identify and alert the IT security team as soon as possible.
- Per the report, more than one-third of organizations will work virtually for a long time. Therefore, they must make long-term plans to survive.
- To beef up WFH cybersecurity, facilitate “full integration to enable automation for end-to-end protection and seamless, consistent operation across multiple, highly dynamic environments,” says Alleyne.
To view the original article in full, visit the following link: https://www.itbusinessedge.com/security/eight-best-practices-for-securing-long-term-remote-work/