The recent impact of coronavirus has placed massive strain on businesses all around the world, changing working culture virtually overnight to make remote working an urgent priority. What quickly became clear, however, is not all companies were in a position to enable their employees to work remotely at such short notice.

Yet, before this crisis unfolded, there were many reasons why a company may need its employees to be able to work from home with little notice – for example, a snowstorm, terrorist threats that prevent people from commuting, or even strikes on public transportation networks. Some companies may need their employees to continue to work through such circumstances, using either corporate equipment or employees’ personal laptops and mobile phones.

While remote access greatly benefits productivity, if the organisation is not equipped with the proper security tools, it leaves them vulnerable to a number of threats. So, what can organisations do to ensure their employees are working securely from any location, no matter what disruptions may arise?

Infrastructure is key to remote productivity

Organisations that maintain onsite workforces encourage employees to work through VPNs and access the corporate network and cloud resources from managed devices that have software agents, like mobile device management. These approaches can create a number of latency issues which make it difficult to deploy and track all web traffic on the users’ devices – including their personal applications. Furthermore, this approach is outdated as it invades employee privacy and violates compliance frameworks such as the General Data Protection Regulation (GDPR).

Organisations that previously did not have the proper technology in place should discuss how they can adapt to handle any future incidents where employees cannot physically come into the office. Bring your own device (BYOD) policies allow employees to work from personal devices, like their mobile phones, as well as work remotely. With BYOD, companies can be sure that employees can get the job done no matter what unforeseen incident hits them.

Changing cybersecurity priorities

With a change in working environment comes the risk of potential data exposure when employees download and share data across personal devices, remote locations, and unsecured networks. As such, it is essential that the right security controls are in place when companies implement BYOD and grant employees to work remotely. There are a number of priorities:

How well do you really know your competitors?

Access the most comprehensive Company Profiles on the market, powered by GlobalData. Save hours of research. Gain competitive edge.

Company Profile – free sample

Thank you!

Your download email will arrive shortly

Not ready to buy yet? Download a free sample

We are confident about the unique quality of our Company Profiles. However, we want you to make the most beneficial decision for your business, so we offer a free sample that you can download by submitting the below form

By GlobalData
Visit our Privacy Policy for more information about our services, how we may use, process and share your personal data, including information of your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
  1. Visibility and control over data

It is critical that organisations maintain visibility and control over data as it is accessed by unmanaged devices. Without the ability to see and control user activity on personal endpoints, organisations may be faced with unauthorised data access, malicious external sharing, and an inability to protect downloaded data when employees lose their devices or have them stolen.

Additionally, organisations should use data loss prevention (DLP) tools that prevent data leakage by identifying and controlling sensitive data-at-rest and upon access. With visibility and control, it’s possible to ensure data does not get into the wrong hands and lead to a breach or potential exposure.

  1. Identity and access management

Identity and access management, such as multi-factor authentication (MFA) or user and entity behaviour analytics (UEBA), must be utilised as they can detect abnormal activity and address mobile security threats. MFA requires a second form of identity verification that authenticates identities to ensure the user is who they say they are. After inputting their passwords, users are required to verify their identities once more through an SMS token sent via email or through a text message.

UEBA learns behaviour and collects a detailed report on every user to be wary of any suspicious activity. For instance, if a user usually logs in from one location but signs on from another (especially when strict travel restrictions are in place), it will send an alert to ensure the user’s account has not been compromised. At the very least, single sign-on (SSO) should be implemented, as it securely authenticates users across all of an enterprise’s cloud applications.

  1. Agentless security

Agentless security is another must for protecting corporate data on personal devices. Agent-based tools that demand software installations on personal devices disrupt user privacy and harm device functionality. Mobile device management (MDM) for example, holds more data than employees realise including login credentials in plain text.

Additionally, when MDM wiping capabilities are used to remove corporate data, everything is deleted from that device including personal pictures, contacts, and more. With agentless tools, IT gets the security and compliance needed while the user does not feel invaded. Companies that are not prepared in advance for an abrupt remote workforce change can take advantage of agentless security at any time as it does not require any installation on the end devices themselves – which is impossible to do under quarantine conditions.

With so many unexpected factors, companies must be prepared for their employees to work remotely at any given moment. Some incidents, like extreme weather or a global pandemic, are out of anyone’s control, and emergency work continuity and security plans should be discussed to protect the company from malicious threats and the need to halt their operations. Enabling a remote workforce securely with BYOD is a huge business advantage, especially when the unthinkable happens.


Read more: “The mental health challenges are really significant”: How the switch to remote working is impacting wellbeing