Are You Securing All Your Remote Workers? – Security Today - Freelance Rack

Work from Home freelancing

Post Top Ad

Post Top Ad

Thursday, April 30, 2020

Are You Securing All Your Remote Workers? – Security Today

Are You Securing All Your Remote Workers?

According to a 2019 State of Remote Work study, 62% of people work from home at least part of the time, with 82% of those individuals planning to either maintain or increase their level of remote work – validating that the physical location of users matters less and less in how organizations conduct business.

While more and more organizations are offering flexible work environments, the COVID-19 pandemic has sped up this trend with dramatic velocity. In the face of ‘shelter in place’ orders around the world, global organizations have had to rush to enable millions of employees to work remotely. Altering systems and processes in a matter of days does not come without challenges – especially when it comes to cybersecurity. As IT teams scramble to act on business continuity plans, cyber attackers have been working just as hard to exploit weaknesses in these continuously changing environments.

Enabling secure connections for the average employee is one thing, but what about those that require access to critical business systems? It’s important to remember that not all remote employees’ and users’ privileges are created equal. Some may just require access to email and a smattering of business applications while others need elevated access to do their jobs.

As organizations lean more heavily on remote users as part of their day-to-day business plan, it’s critical to be able to identify and understand the different types of users that are logging into their systems outside of their offices – and the user privileges they’ll need.

With protecting our remote workforce set to be a challenge throughout 2020 and beyond, the question remains: what types of remote users do you need to account for in our new normal?

IT and Security Employees

It is critical to identify the specific levels of access needed by remote IT and security employees and implement least privilege rights to ensure that they’re only accessing what they need, when they need it. VPNs – which have traditionally been the tools to enable secure remote access — aren’t able to provide the required level of granular, application-level access needed for these users.

No comments:

Post a Comment

Post Top Ad