Arguably one of the largest corporate impacts of the pandemic is the shift in working habits and thus remote work IoT security. At the height of lockdown restrictions, remote working became the norm, and this continues to be the preferred working model for many employees even as offices have begun to open back up. For example, according to a recent Pew Research, 76 percent of employees who are working from home cite their preference as their primary reason for doing so.
As employees and employers alike settle into remote working for the long-term, it’s important that they stay abreast of emerging security concerns. When the abrupt pivot to the remote model happened two years ago, both enterprises and employees scrambled to ensure everyone and everything was connected. In the chaos, security was often an afterthought, but companies have an opportunity today to eliminate any lingering vulnerabilities and ensure a more secure remote model.
When the majority of workers operate out of a physical location, there are generally robust security procedures in place. It’s not always possible—or practical—to implement these when employees are working remotely. In addition, the WFH model introduces its own security concerns, ranging from weak passwords on personal computers, poorly secured wi-fi, or the family’s Alexa passing along malware.
So, what can be done to address these vulnerabilities? Some helpful tips for both IT departments and employees include:
Network security is another important consideration. Employees may be cognizant of security best practices in the office, but it’s not unusual for them to be much less vigilant at home. Companies with remote staff must educate them on home network risks, including the fact that many household products like baby monitors or smart TVs can introduce numerous security vulnerabilities. In addition, there is always the possibility that children or spouses could unintentionally download malware on the home network. For these and other reasons, organizations should encourage employees to set up a separate wi-fi account to be used solely for business whenever possible. It’s also important that employees use their VPN to access any files or systems when they are not physically working in the office.
Another concern to be mindful of is the vulnerabilities that arise when employees look for workarounds—something that is increasingly common with remote or hybrid working models. Examples of workarounds include emailing confidential data to personal accounts or copying the information to a USB in the interest of convenience. There are various ways organizations can address this threat depending on what works best for them. For example, they can collaborate with IT to add new resources or files to the intranet or launch other digital services that make it easier for employees to do their jobs remotely. Regardless of how a company chooses to address the workaround vulnerability, it’s important that it also monitors for this activity and continues to educate employees on the threat.
Copyright © 2024 Vositone Technologies. All rights reserved. Privacy Policy | Terms