Security Needs in Our Work From Home Culture

by Joe Brown, Tuesday, November 29, 2022

The Covid-19 pandemic accelerated the shift to the fully remote workforce. And with the advent of a 100% remote workforce, endpoint security is much more of a concern - as users are no longer on premises but remain directly connected to an organization’s internal network. Organizations now rely on their workforce to provide the physical security of their laptops and desktops while working from home. This marks some necessary shifts in how we handle computer security.

What systems or measures need to be in place to keep working from home secure and safe?

A virtual private network connection is an absolute requirement. VPNs provide an encrypted tunnel from the home office to an organization’s network.  A VPN provides a protective measure, ensuring that private and confidential information remains secure.

Organizations should also have their workforce complete a home office survey where they attest that certain controls are in place in their work area, such as keeping devices physically secure, for example. Encryption must be enabled on their Wi-Fi router. A survey like this helps to create an understanding of the required security measures, increasing buy-in and compliance.

An endpoint protection service with more than just anti-virus is essential with a 100% remote workforce. Advanced features needed to help keep  remote work secure include:

  1. Patch management ensures the endpoint is up to date with operating systems, applications, and AV patches
  2. Software inventory reporting displays what software is installed on endpoints
  3. Threat detection and notification identifies and quarantines threats, sending notifications to administrators so that necessary action can be taken quickly
  4. Administrators are able to schedule and perform endpoint vulnerability scans
  5. Administrators can generate diagnostic logs needed for system troubleshooting
  6. Remote restart capabilities provide an added layer of security
  7. Endpoint status displays whether the device is turned on and proactively identifies and displays exceptions with regards to policies

Poor computer and information security practices can lead to security incidents and breaches that could compromise organizations’ sensitive information.  Recovering from incidents and breaches is time consuming and expensive; the best way to prevent such challenges is to practice ongoing computer security. It is certainly easier to prevent than it is to recover sensitive information. With the right tools in place, your organization can protect its sensitive information and employees. 

Knowledge Exchange

Stay up-to-date and never miss a post.

Subscribe to Knowledge Exchange

eBook: Cloud Computing

Download Now! Plan for now, prepare for tomorrow with the latest insights on Cloud Computing in our rapidly changing digital world.