Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Kurt John
Kurt John
Connect Directly
E-Mail vvv

Key Considerations & Best Practices for Establishing a Secure Remote Workforce

Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

As is well known by now, the COVID-19 pandemic forced companies to reposition their workforces nearly overnight. And with roughly 40% of Americans shifting to remote work, it didn't take long for the sophistication and frequency of cyberattacks to increase. With flexible work environments here to stay and bad actors provided with new opportunities for preying on a vulnerable workforce, enterprises must educate employees to effectively manage evolving cybersecurity threats without sacrificing business agility.

Related Content:

Since Remote Work Isn't Going Away, Security Should Be the Focus

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: RASP 101: Staying Safe With Runtime Application Self-Protection

Below are considerations derived from several key principles highlighted by the global alliance known as "The Charter of Trust," of which Siemens is a founding member. These steps are aimed at protecting businesses of varying sizes and include considerations ranging from employee best practices to basic criteria for hardware selection.

Where to Begin
A robust cybersecurity strategy relies on three pillars focused on establishing digital resiliency:

  1. Comprehensive, yet flexible, foundational policies that support the intersection of business objectives and information protection.

  2. An informed and vigilant workforce that can identify risks and react accordingly.

  3. Risk management solutions that address the evolving threat landscape.

Beginning with foundational cybersecurity hygiene, critical factors to drive digital resiliency include:

  1. Ensuring that employees, the first line of defense, are aware of all available information security resources. Workforce education and empowerment is critical, as it provides employees with the capacity not only to protect their own data but also to serve as the "Human Sensor Network" capable of helping spot suspicious activities.

  2. In the era of remote work, companies need to be more intentional about facilitating employees' understanding of — and engagement with — cybersecurity. Company communication channels are effective tools that should be leveraged frequently to activate on this.

    Ensuring that all company devices are enabled to automatically receive and apply critical software updates/patches without needing to be on the corporate network, empowering remote employees to minimize steps when maintaining digital integrity.
  3. Leveraging multifactor authentication (MFA) for all user accounts to provide an added layer of data protection.

"Work from Anywhere" Security
As employees choose to continue to work remotely, security vulnerabilities will persist. To better secure their workforces, enterprises must ensure that employees engage in good cyber-hygiene practices, such as the utilization of strong Wi-Fi encryption and complex passwords. Beyond this, organizations must also consider enacting significant changes to the way they approach data security.

For example, while corporate-issued virtual private networks (VPNs) are useful for securing company data in transit, they can sometimes lock an organization into a rigid configuration that doesn't always lend itself to the ever-evolving technology landscape. And with the pandemic accelerating digitization, we know that technology landscapes will continue to shift. Due to this, organizations should invest in flexible architecture, like zero trust — a broad term denoting a collection of technologies that facilitate the confirmation of users' identities as they traverse corporate resources.

Organizations should consider multiple solutions for authentication so that employees have flexibility based on a variety of scenarios they may experience in their day-to-day, such as second-factor authentication mechanisms, which include text messaging, hardware-issued cards, and mobile applications.  

Organizations should also think carefully about their policies pertaining to employees' personal devices — something that used to be off limits. Now that corporate devices are sharing private networks with potentially insecure devices, it is imperative that employees are provided with guidance and, where necessary, tools to help better bolster security.

In the age of the Internet of Things and connected devices, this is even more relevant than ever before. For example, an unpatched connected washing machine, stove, or thermostat can provide entry points for hackers. Similarly, voice-controlled smart speakers and other connected devices that have the capability to record audio and/or video may pose an eavesdropping risk.

Employees should be encouraged to remove or turn off smart devices and cover webcams when possible to ensure sensitive recordings do not fall into the wrong hands.

The Human Sensor Network
A constant priority for businesses should be continuing to empower employees to be deputized security team members, who can help to proactively identify potential threats and vulnerabilities in real time.

To empower this "Human Sensor Network," employees should be provided with an overview of best practices in confirming email addresses and legitimizing email requests for sensitive information. For example, a reporting protocol can be created for employees to help them report such potentially dangerous requests to create a security ecosystem amongst staff.

Lastly, employees should be consistently encouraged to always be on the defensive — this will help with mitigating unnecessary risks.

Future Opportunities
While these new challenges have arisen unexpectedly and almost instantaneously, if addressed correctly, we can all work together to protect ourselves moving forward. Cybersecurity is challenging but not paralyzing, and it's the right moment to educate our employees while facing these challenges. As cybersecurity remains a critical issue for both the private and public sectors, open lines of communications internally and externally will help improve our collective digital resilience, yielding a safer digital environment for all.

Kurt John is the Chief Cybersecurity Officer of Siemens USA, where he is responsible for the Cybersecurity strategy, governance and implementation for the company's largest market -- ~$23B in annual revenues. In this role, Kurt oversees the coordination of cybersecurity for ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Sure you have fire, but he has an i7!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
SQL injection in admin.php in doctor appointment system 1.0 allows an unauthenticated attacker to insert malicious SQL queries via username parameter at login page.
PUBLISHED: 2021-03-04
On Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200, portions of the drive containing executable code were not encrypted thus leaving it open to potential cryptographic information disclosure.
PUBLISHED: 2021-03-04
Missing permission check in knox_custom service prior to SMR Mar-2021 Release 1 allows attackers to gain access to device's serial number without permission.
PUBLISHED: 2021-03-04
Graphic format mismatch while converting video format in hwcomposer prior to SMR Mar-2021 Release 1 results in kernel panic due to unsupported format.
PUBLISHED: 2021-03-04
A possible arbitrary memory overwrite vulnerabilities in quram library version prior to SMR Jan-2021 Release 1 allow arbitrary code execution.