Key Considerations & Best Practices for Establishing a Secure Remote WorkforceKey Considerations & Best Practices for Establishing a Secure Remote Workforce
Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.
October 8, 2020
As is well known by now, the COVID-19 pandemic forced companies to reposition their workforces nearly overnight. And with roughly 40% of Americans shifting to remote work, it didn't take long for the sophistication and frequency of cyberattacks to increase. With flexible work environments here to stay and bad actors provided with new opportunities for preying on a vulnerable workforce, enterprises must educate employees to effectively manage evolving cybersecurity threats without sacrificing business agility.
Below are considerations derived from several key principles highlighted by the global alliance known as "The Charter of Trust," of which Siemens is a founding member. These steps are aimed at protecting businesses of varying sizes and include considerations ranging from employee best practices to basic criteria for hardware selection.
Where to Begin
A robust cybersecurity strategy relies on three pillars focused on establishing digital resiliency:
Comprehensive, yet flexible, foundational policies that support the intersection of business objectives and information protection.
An informed and vigilant workforce that can identify risks and react accordingly.
Risk management solutions that address the evolving threat landscape.
Beginning with foundational cybersecurity hygiene, critical factors to drive digital resiliency include:
Ensuring that employees, the first line of defense, are aware of all available information security resources. Workforce education and empowerment is critical, as it provides employees with the capacity not only to protect their own data but also to serve as the "Human Sensor Network" capable of helping spot suspicious activities.
In the era of remote work, companies need to be more intentional about facilitating employees' understanding of — and engagement with — cybersecurity. Company communication channels are effective tools that should be leveraged frequently to activate on this.
Ensuring that all company devices are enabled to automatically receive and apply critical software updates/patches without needing to be on the corporate network, empowering remote employees to minimize steps when maintaining digital integrity.
Leveraging multifactor authentication (MFA) for all user accounts to provide an added layer of data protection.
"Work from Anywhere" Security
As employees choose to continue to work remotely, security vulnerabilities will persist. To better secure their workforces, enterprises must ensure that employees engage in good cyber-hygiene practices, such as the utilization of strong Wi-Fi encryption and complex passwords. Beyond this, organizations must also consider enacting significant changes to the way they approach data security.
For example, while corporate-issued virtual private networks (VPNs) are useful for securing company data in transit, they can sometimes lock an organization into a rigid configuration that doesn't always lend itself to the ever-evolving technology landscape. And with the pandemic accelerating digitization, we know that technology landscapes will continue to shift. Due to this, organizations should invest in flexible architecture, like zero trust — a broad term denoting a collection of technologies that facilitate the confirmation of users' identities as they traverse corporate resources.
Organizations should consider multiple solutions for authentication so that employees have flexibility based on a variety of scenarios they may experience in their day-to-day, such as second-factor authentication mechanisms, which include text messaging, hardware-issued cards, and mobile applications.
Organizations should also think carefully about their policies pertaining to employees' personal devices — something that used to be off limits. Now that corporate devices are sharing private networks with potentially insecure devices, it is imperative that employees are provided with guidance and, where necessary, tools to help better bolster security.
In the age of the Internet of Things and connected devices, this is even more relevant than ever before. For example, an unpatched connected washing machine, stove, or thermostat can provide entry points for hackers. Similarly, voice-controlled smart speakers and other connected devices that have the capability to record audio and/or video may pose an eavesdropping risk.
Employees should be encouraged to remove or turn off smart devices and cover webcams when possible to ensure sensitive recordings do not fall into the wrong hands.
The Human Sensor Network
A constant priority for businesses should be continuing to empower employees to be deputized security team members, who can help to proactively identify potential threats and vulnerabilities in real time.
To empower this "Human Sensor Network," employees should be provided with an overview of best practices in confirming email addresses and legitimizing email requests for sensitive information. For example, a reporting protocol can be created for employees to help them report such potentially dangerous requests to create a security ecosystem amongst staff.
Lastly, employees should be consistently encouraged to always be on the defensive — this will help with mitigating unnecessary risks.
While these new challenges have arisen unexpectedly and almost instantaneously, if addressed correctly, we can all work together to protect ourselves moving forward. Cybersecurity is challenging but not paralyzing, and it's the right moment to educate our employees while facing these challenges. As cybersecurity remains a critical issue for both the private and public sectors, open lines of communications internally and externally will help improve our collective digital resilience, yielding a safer digital environment for all.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023