Remote Working Is The New Normal

The concept of  remote worker working on the go from multiple locations has become more prevalent, as consumer Wi-Fi becomes faster, more users carry corporate laptops or BYOD-permitted smartphones and since  many workers no longer need a need access to a printer and the fax machine has disappeered from most workplaces.. 

Which has proved a  good preparation for the current COVID-19 lockdown, where remote working has moved from being something that you may do one day a week to something that is the new normal for many people. 

Remote working (RW) may be a novelty for some, but this type of flexible working arrangement is increasingly popular. It can provide a better work/life balance by allowing people to live further from their workplaces and it can be very useful during periods of extreme weather when it is unsafe to travel. 

While many companies have adopted off-site work for a small fraction of their employees and functions, transitioning to large scale remote work is very challenging not only from a process perspective but also culturally. Some employees will always need to have access to systems that only exist on premises, while others gain valuable satisfaction and fulfillment from face-to-face communications with peers, partners and of course customers. 

Companies that have adopted the cloud early will discover that a large majority of their systems are no longer bound to their physical office, while others, especially more established firms, are likely to rely substantially on tools deployed on premises or in their own data center. 

Similarly, companies that have allowed some level of remote work will find their employees more experienced and quicker to transition to a 100% remote atmosphere.  Employees who are used to working from home once a week will most likely have a better at-home work setup and understand the pitfalls of remote work already, which makes the transition easier than for those with no experience. 

The almost global move to home working for many organisations has direct implications on security. In particular, and in addition to the multitude of new phishing attacks and many experts no longer think  that remote work and the cyber security risks associated with this new workforce will come to an end when the coronavirus pandemic is over. 

From a technology perspective, there are unique challenges when it comes to the use of Software as a Service (SaaS) and Cloud Services, particularly when teams can no longer work in a physical location together

Each of these applications may have its own point of access, and when users reach them directly from their home networks, enterprise visibility and policy-based control for each of these connections may be lost and difficult to regain. The remote working factor has hit companies with an unexpected blow, and many were unlikely to be so prepared for this to happen. Now we have to consider that this situation will remain for some time, and the onus is on businesses to ensure that the technical and communication channels remain enabled.

Digital technology may free people to work remotely in the first place, but it also causes unforeseen problems and 24/7 work culture didn’t happen overnight, or because of coercive managers. Instead, the perceived division between work and non-work has steadily disappeared over time, while few of us were paying attention.

Remote working could well become permanent for many people. Many companies were encouraging staff to work elsewhere to reduce office costs before the outbreak, and this will probably be all the more attractive to the businesses that survive this crisis.  In ten years we may look back from our remote workstations and remember 2020 as the year we last went into the office. 

The Conversation:         BBC:        Infosecurity Magazine:     Cybereason

You Might Also Read: 

The Risks Of Remote Working:

Security Advice For Using Video Conference Tools:

For more information, please contact Cyber Security Intelligence for advice  and recommendations on training for employees.

 

 

 

« Coronavirus Is Good For Online Business
Millions of Facebook Profiles For Sale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Computex Technology Solutions

Computex Technology Solutions

Computex is an IT solutions provider delivering high-performance IT infrastructure solutions from assessment and design through to implementation, security and management.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

FCase

FCase

FCase is an end-to-end Fraud Orchestrator which takes fraud management systems from basic, standalone detection to an enterprise-focused approach.

ISH Technologies

ISH Technologies

ISH provides Cybersecurity Services, IT Infrastructure Services, Cloud Computing Services, and a Tier III Data Center.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Everything Blockchain

Everything Blockchain

Everything Blockchain is a development, architecture, and software designer of Blockchain that also provides services specializing in blockchain technologies and decentralized processing.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.