Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Kurt John
Kurt John
Connect Directly
E-Mail vvv

Key Considerations & Best Practices for Establishing a Secure Remote Workforce

Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

As is well known by now, the COVID-19 pandemic forced companies to reposition their workforces nearly overnight. And with roughly 40% of Americans shifting to remote work, it didn't take long for the sophistication and frequency of cyberattacks to increase. With flexible work environments here to stay and bad actors provided with new opportunities for preying on a vulnerable workforce, enterprises must educate employees to effectively manage evolving cybersecurity threats without sacrificing business agility.

Related Content:

Since Remote Work Isn't Going Away, Security Should Be the Focus

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: RASP 101: Staying Safe With Runtime Application Self-Protection

Below are considerations derived from several key principles highlighted by the global alliance known as "The Charter of Trust," of which Siemens is a founding member. These steps are aimed at protecting businesses of varying sizes and include considerations ranging from employee best practices to basic criteria for hardware selection.

Where to Begin
A robust cybersecurity strategy relies on three pillars focused on establishing digital resiliency:

  1. Comprehensive, yet flexible, foundational policies that support the intersection of business objectives and information protection.

  2. An informed and vigilant workforce that can identify risks and react accordingly.

  3. Risk management solutions that address the evolving threat landscape.

Beginning with foundational cybersecurity hygiene, critical factors to drive digital resiliency include:

  1. Ensuring that employees, the first line of defense, are aware of all available information security resources. Workforce education and empowerment is critical, as it provides employees with the capacity not only to protect their own data but also to serve as the "Human Sensor Network" capable of helping spot suspicious activities.

  2. In the era of remote work, companies need to be more intentional about facilitating employees' understanding of — and engagement with — cybersecurity. Company communication channels are effective tools that should be leveraged frequently to activate on this.

    Ensuring that all company devices are enabled to automatically receive and apply critical software updates/patches without needing to be on the corporate network, empowering remote employees to minimize steps when maintaining digital integrity.
  3. Leveraging multifactor authentication (MFA) for all user accounts to provide an added layer of data protection.

"Work from Anywhere" Security
As employees choose to continue to work remotely, security vulnerabilities will persist. To better secure their workforces, enterprises must ensure that employees engage in good cyber-hygiene practices, such as the utilization of strong Wi-Fi encryption and complex passwords. Beyond this, organizations must also consider enacting significant changes to the way they approach data security.

For example, while corporate-issued virtual private networks (VPNs) are useful for securing company data in transit, they can sometimes lock an organization into a rigid configuration that doesn't always lend itself to the ever-evolving technology landscape. And with the pandemic accelerating digitization, we know that technology landscapes will continue to shift. Due to this, organizations should invest in flexible architecture, like zero trust — a broad term denoting a collection of technologies that facilitate the confirmation of users' identities as they traverse corporate resources.

Organizations should consider multiple solutions for authentication so that employees have flexibility based on a variety of scenarios they may experience in their day-to-day, such as second-factor authentication mechanisms, which include text messaging, hardware-issued cards, and mobile applications.  

Organizations should also think carefully about their policies pertaining to employees' personal devices — something that used to be off limits. Now that corporate devices are sharing private networks with potentially insecure devices, it is imperative that employees are provided with guidance and, where necessary, tools to help better bolster security.

In the age of the Internet of Things and connected devices, this is even more relevant than ever before. For example, an unpatched connected washing machine, stove, or thermostat can provide entry points for hackers. Similarly, voice-controlled smart speakers and other connected devices that have the capability to record audio and/or video may pose an eavesdropping risk.

Employees should be encouraged to remove or turn off smart devices and cover webcams when possible to ensure sensitive recordings do not fall into the wrong hands.

The Human Sensor Network
A constant priority for businesses should be continuing to empower employees to be deputized security team members, who can help to proactively identify potential threats and vulnerabilities in real time.

To empower this "Human Sensor Network," employees should be provided with an overview of best practices in confirming email addresses and legitimizing email requests for sensitive information. For example, a reporting protocol can be created for employees to help them report such potentially dangerous requests to create a security ecosystem amongst staff.

Lastly, employees should be consistently encouraged to always be on the defensive — this will help with mitigating unnecessary risks.

Future Opportunities
While these new challenges have arisen unexpectedly and almost instantaneously, if addressed correctly, we can all work together to protect ourselves moving forward. Cybersecurity is challenging but not paralyzing, and it's the right moment to educate our employees while facing these challenges. As cybersecurity remains a critical issue for both the private and public sectors, open lines of communications internally and externally will help improve our collective digital resilience, yielding a safer digital environment for all.

Kurt John is the Chief Cybersecurity Officer of Siemens USA, where he is responsible for the Cybersecurity strategy, governance and implementation for the company's largest market -- ~$23B in annual revenues. In this role, Kurt oversees the coordination of cybersecurity for ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-23
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph...
PUBLISHED: 2020-11-23
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a...
PUBLISHED: 2020-11-23
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating sy...
PUBLISHED: 2020-11-23
TYPO3 is an open source PHP based web content management system. In TYPO3 from version 10.4.0, and before version 10.4.10, RSS widgets are susceptible to XML external entity processing. This vulnerability is reasonable, but is theoretical - it was not possible to actually reproduce the vulnerability...
PUBLISHED: 2020-11-23
prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters.