7 Best Practices for Enabling and Securing Remote Work

Opret en gratis Insights-profil hos Ingeniøren og få direkte og nem adgang til whitepapers, webinarer og e-magasiner.
Når du tilgår dette materiale, accepterer du, at sponsoren af materialet kan kontakte dig på din oplyste e-mailadresse og telefonnummer med markedsføring af ydelser, der relaterer sig til emnet, som materialet omhandler.

Today’s remote workforce, regardless of what they do on a day-to-day basis, demand flexibility. They require the need to do their jobs wherever they might be, whenever they might need to do it. However, with this increased flexibility comes new security challenges that require modern solutions. For instance, a 2020 CyberArk survey found that 77% of remote employees are using unmanaged personal devices to access corporate systems. Further, 29% of users admitted to allowing other members of their household use of their corporate devices for non-work activities. Things like homework, internet browsing, email and more, bringing immense risk and danger to the endpoints that are then being used to access your company’s sensitive systems and data.

As a result, the challenges facing IT and security teams today are dramatically different and a top priority for all organizations is ensuring that their remote workforce is staying productive and secure, including users who have privileged access to sensitive systems and applications such as IT admins, DevOps team members, SaaS admins. Here we’ll lay out seven best practices to ensure that remote users are able to stay productive, while aligning with security best practices.