BLOG

Remote Working & Security Challenges

Samir Desai examines how recent world events have put remote working and its security implications at the top of the ICT agenda. His security playbook offers up tactics for protecting end-users.
October 9, 2020

Let’s face it – remote working is here to stay. What was a distraction and an afterthought for ICT managers at the end of last year is now an integral part of any go-forward enterprise networking environment. The benefits of enabling a remote, borderless and telecommuting workforce are obvious in terms of employee well-being and maximized productivity. Prospective employers now look to offer flexible, remote working as a real benefit to attract the best talent.

Most IT teams have built their security infrastructures over the years specifically to protect enterprise networks and the information within them. With the sudden rise in remote working, corporations needed to rely on Virtual Private Network technologies for employees to continue to be able to gain access to enterprise networks from outside of the traditional office LAN environment.

Remote working is here to stay. What was an afterthought for ICT managers at the end of last year is now an integral part of any go-forward enterprise networking environment.

Unfortunately, cybercriminals also continue to develop new and sophisticated ways to take advantage of increased remote mobility in order to gain access to networks and valuable data. The volume of cyber incidents targeting newly remote employees through email phishing tactics and compromised end-user devices has reached record levels.

A typical home working environment can be a localized mixed-use network of corporate devices, highly insecure IoT or personal devices and shared accounts. This offers an ideal foundation for the potential exfiltration of company data and other nefarious cybercriminal activity. As a result, the so-called “attack surface” has increased substantially with the growth of remote working. This brings with it a whole new set of challenges in the war against cybercriminal activity with secure remote networking and risk management becoming the primary imperatives.

A secure remote working playbook

Here are a few tactics to consider when it comes to protecting remote end-users — and, by extension, the enterprise business:

  1. Education: The single most important element in keeping confidential data safe is remote user awareness. Keep employees informed, not only about what they should do, but also about why they need to do it. A handbook should include best practices such as enabling two-factor authentication and requiring VPN login to apps and programs containing sensitive information. Consider defining an Acceptable Use Policy (AUP), so employees know what websites, apps and networks are permitted for accessing data, to avoid potential threats.

    The single most important element in keeping confidential data safe is remote user awareness.

  2. Permissive access: Another risk area is how to implement and manage corporate policies that govern who accesses the network. A simple “one-size-fits-all” approach that gives every remote user the same level of privileged access to their network resources, regardless of whether they need it, presents potential security risks. Striking the right balance between user access management and effective, secure remote access to on-premises resources, hybrid cloud environments, and business applications using policies is key. Working with a managed service partner, who can help define and implement granular policies, can go a long way toward establishing the right, robust security posture for remote workers. A simple “one-size-fits-all” approach presents potential security risks. Striking a balance between user access management and secure remote access using policies is key.A simple “one-size-fits-all” approach presents potential security risks. Striking a balance between user access management and secure remote access using policies is key.

    If remote working cannot be restricted to a VPN, then there’s the risk of opening services directly to the internet for hackers to exploit. Any new internet-facing application needs to be planned, understood, secured and tested before use. Enterprises should always strive to balance the need for cybersecurity against the requirement for a more accessible internet-based and cloud-centric application environment.

  3. Balance productivity with security: The business still needs to operate, albeit in a different mode. For that to happen, the secure end-user experience needs to be maintained, especially when dealing with a globally distributed workforce spanning borders and even continents. Consider how remote users can locally access their key applications and data with minimal latency impact using a globalized secure remote access platform. Flexibility in augmenting additional remote users as the need arises via a simple per-user seat commercial model should also be a consideration going forward.

Acerca de GTT

GTT connects people across organizations, around the world, and to every application in the cloud. Our clients benefit from an outstanding service experience built on our core values of simplicity, speed, and agility. GTT owns and operates a global Tier 1 internet network and provides a comprehensive suite of cloud networking services. We also offer a complementary portfolio of advanced security services.

ovum banner

Related RESOURCES

OUR GARTNER RATING

4.2

62 reviews

88%

as of the last 12 months
Scroll to Top

GTT Recognized as a Leader by ISG

See Why GTT Stands Out in the Latest ISG Provider Lens™ Report

We’re proud to share that GTT has been named a leader in the newest ISG Provider Lens™ report. This recognition reflects our continued commitment to delivering secure, high-performance network solutions for global enterprises.

Read the full report to see how GTT compares.

GTT Recognized as a Leader by ISG

See Why GTT Stands Out in the Latest ISG Provider Lens™ Report

We’re proud to share that GTT has been named a leader in the newest ISG Provider Lens™ report. This recognition reflects our continued commitment to delivering secure, high-performance network solutions for global enterprises.

Read the full report to see how GTT compares.

GTT Reconocido como Líder por ISG

Descubre por qué GTT destaca en el último informe ISG Provider Lens™

Nos enorgullece anunciar que GTT ha sido nombrado líder en el nuevo informe ISG Provider Lens™. Este reconocimiento refleja nuestro compromiso continuo con ofrecer soluciones de red seguras y de alto rendimiento para empresas globales.

Lee el informe completo y compara los resultados.

GTT als führender Anbieter von ISG ausgezeichnet

Erfahren Sie, warum GTT im neuesten ISG Provider Lens™ Report hervorsticht

Wir freuen uns, mitteilen zu können, dass GTT im aktuellen ISG Provider Lens™ Report als führender Anbieter ausgezeichnet wurde. Diese Anerkennung unterstreicht unser Engagement für sichere, leistungsstarke Netzwerklösungen für globale Unternehmen.

Lesen Sie den vollständigen Bericht und erfahren Sie mehr.

GTT riconosciuta come leader da ISG

Scopri perché GTT si distingue nel nuovo report ISG Provider Lens™

Siamo orgogliosi di annunciare che GTT è stata riconosciuta come leader nel più recente report ISG Provider Lens™. Questo riconoscimento testimonia il nostro impegno costante nel fornire soluzioni di rete sicure e ad alte prestazioni per le aziende globali.

Leggi il report completo per saperne di più.

GTT reconnu comme un leader par ISG

Découvrez pourquoi GTT se distingue dans le dernier rapport ISG Provider Lens™

Nous sommes fiers d’annoncer que GTT a été reconnu comme un leader dans le dernier rapport ISG Provider Lens™. Cette reconnaissance témoigne de notre engagement constant à fournir des solutions réseau sécurisées et performantes pour les entreprises internationales.

Lisez le rapport complet pour en savoir plus.