Home Cloud Computing WFH security lessons from the pandemic

WFH security lessons from the pandemic

148
19

A year ago, IT and cybersecurity teams faced a number of challenges — constantly emerging threats, data privacy regulations, and a significant and widening skills gap, to name a few. Then things really got difficult.

The COVID-19 pandemic and its impact on business processes changed the security dynamic in a big way, making matters even more complex. Shifts to cloud services were accelerated. E-commerce efforts were launched or expanded. COVID-related cyberattacks became common.

But the most significant development was the sudden and massive shift to a remote workforce. Seemingly overnight, employees who’d formerly worked in offices began working from home, many relying on their own computing devices and makeshift network access methods, with IT departments scrambling to protect their devices and data.

As the pandemic enters its second year, it’s worth reviewing some of the security lessons we’ve learned so far and looking ahead at the techniques and technologies that will help protect the future hybrid workplace.

Enterprises should extend endpoint protection tools

For one thing, organizations have discovered that they need to extend the capabilities of their existing security infrastructures in ways they might not have considered before the work-from-home shift. That includes ensuring that corporate security practices and tools that fortify and defend a company’s perimeter can cover a broader range of geographic locations to account for home offices.

“Moving into a remote work environment has meant a change in focus from macro-level security to micro-level extensions of platforms and adoption of new ways of extending a secure environment to remote workers,” says Mark Liggett, CEO of Liggett Consulting and a longtime IT and cybersecurity consultant.

During the past year, the firm has advised companies on extending their endpoint protections and endpoint detection and response tools to their remote users. “This type of change might take negotiation with vendors to add additional licenses for remote users,” Liggett says.

“Some vendors include licensing by user ID rather than device, which can save time and money on deployment. In today’s environment, it is worth a review and pressing for the options that you need to accomplish a secure working environment anywhere,” advises Liggett.

Copyright © 2021 IDG Communications, Inc.

19 COMMENTS

  1. An outstanding share! I’ve just forwarded this onto a coworker who had been doing a little research on this.

    And he in fact bought me lunch due to the fact that I stumbled
    upon it for him… lol. So let me reword this….
    Thanks for the meal!! But yeah, thanx for
    spending some time to talk about this matter here on your site.

  2. My brother recommended I might like this blog.
    He used to be entirely right. This submit actually
    made my day. You cann’t consider just how so much time I had spent for this info!
    Thanks!

  3. Hello! This post could not be written any better! Reading through this post
    reminds me of my old room mate! He always kept talking about this.
    I will forward this page to him. Fairly certain he will
    have a good read. Many thanks for sharing!

    Feel free to visit my blog post; Jannette

  4. Hey there! This is kind of off topic but I need some guidance
    from an established blog. Is it very hard to set up your own blog?
    I’m not very techincal but I can figure things out pretty fast.
    I’m thinking about setting up my own but I’m not sure where to begin. Do you have any ideas or suggestions?
    Thanks

    Here is my webpage :: anapa-alrosa.com.ru

  5. Hi! I know this is somewhat off topic but I was wondering which blog platform are you using
    for this site? I’m getting tired of WordPress because I’ve
    had problems with hackers and I’m looking at options for another platform.
    I would be great if you could point me in the direction of a
    good platform.

    Feel free to surf to my site – xe88 Game

  6. Thanks for ones marvelous posting! I certainly enjoyed reading it, you will be a great author.

    I will always bookmark your blog and will often come back someday.
    I want to encourage you to continue your great writing, have
    a nice weekend!

    Check out my blog post; mpc-install.com

  7. I as well as my guys happened to be going through the excellent tips
    and hints from your web blog and so unexpectedly I had a horrible suspicion I had not thanked the site owner for those tips.

    The young boys were as a consequence very interested to read them and
    have in effect in truth been enjoying those things. I appreciate you for
    turning out to be indeed thoughtful and also for deciding on this kind of good subject areas millions
    of individuals are really eager to know about. Our sincere
    apologies for not saying thanks to you sooner.

    my homepage; mpc-install.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here