Remote office: avoid shadow IT
For IT teams managing a remote workforce, shadow IT is a problem. Employees may use their own applications or personal devices that are not controlled and updated by company administrators. This creates new points of attack for the company network and must be secured. Organizations need to implement a multi-factor authentication (MFA) solution to verify employee identity and strengthen the security of the organization.
Password management and secure video conferencing
Many employees find it frustrating to update passwords frequently. Users often underestimate the dangers posed by their password. With the help of a password manager, however, they can quickly and seamlessly create and manage secure passwords. Good solutions have multi-factor authentication for additional security checks or location comparisons. It is equally important to instruct employees to use the security features of the video conferencing solution they are using. For many tools, this includes using custom meeting urls and password protecting your meetings. Security training courses and awareness programs help to convey “cyber-intelligent” behavior to employees. Everyone should recognize phishing emails privately as well as professionally and know how secure passwords are created.
Remote office offers opportunities for new, secure workplaces
The new remote working standard offers organizations the opportunity to sharpen their cyber security policy, IT infrastructure and security culture. Building a security culture takes time and resources, but in the long term it leads to crucial security in order to protect employees and companies from growing threats.
Also read: Legally compliant email archiving – new territory for three quarters of small businesses.
Gerald Beuchelt is the Chief Information Security Officer (CISO) responsible for the entire security, compliance and technical data protection program Log me in responsible.