The majority of organizations in North America anticipate employees will begin returning to the office by the end of Q1’21—although likely not full time. Pre-COVID, remote working was a benefit provided occasionally to employees. According to a recent survey by Willis Towers Watson, about 20% of the workforce will telework full-time post-COVID–nearly triple that number a year ago. It is likely the majority of the workforce will split their work week at home as well as in the office.

As organizations rushed to send employees home earlier this year, many did so without preparing for the security risks associated with telework.  In learning to operate in a post-COVID ecosystem, we all are trying to cope with the stress of these uncertain times and inconsistencies resulting from an ever-changing environment.  Organizations can help by providing consistency in the application of cyber security tools and processes in order to unburden their staff and remove obstacles on the workforce to maintain successful protection. A focus on a common tool set that protects the endpoints and enterprise resources in a consistent and repeatable experience—providing the ability to achieve a zero-trust model, dramatically reducing the opportunity for human error, and building a level of confidence in an enterprise’s cyber security posture—is critical.

From the same survey, only one in five organizations provided tools and resources to help employees work remotely, and only one in ten offered subsidies to manage associated costs. Remote work is a well-known cyber risk, and cyber-attacks have been on the rise over the past several months. Most remote workers do not have the knowledge or capabilities to update WI-FI routers, VPNS or the security software on their personal devices. And most employees are accessing corporate networks via their own unmanaged networks and accessing software applications from the public cloud.

As organizations shift their view of remote working from a short-term to long-term, it is the right time to reassess and revamp security technologies and policies in order to protect confidential data against theft and unintentional lost. Organizations should extend security controls beyond their campus networks and company issued devices into employee’s homes. Solutions must be easy to use by employees with varying technical capabilities. They must support centralized deployment and management. And they must be cost effective.

SPYRUS can help with security experts on-hand to help organizations consider policies and practices that protect confidential data in motion, at rest and in use. We also offer award-winning solutions designed to support secure remote work. Our SPYRUS DevicePatrol™ Platform arms IT departments with a unique device management server and a family of security tokens which enable remote connectivity to corporate networks for teleworkers without having to provide additional costly hardware in the form of corporate laptops. Additionally, our SPYRUS NcryptNshare application enables geographically dispersed teams to securely collaborate over unsecured communication paths, ensuring the protection of critical data and workflows.

Send me a note at sales@spyrus.com to learn more.