cybersecurityIn a survey of over 200 Threatpost readers, about 52% revealed that their organizations are prepared. However, they still have some groups of employees who present security challenges when it comes to work from home (WFH) approaches. Around 30% said that they feel that they’re fully prepared to make the transition to remote working.

Looking At The Statistics

Around 13% revealed that they are only prepared to move a minority of their employees to online platforms. About 70% of the respondents consider remote working as a fairly new strategy. Meanwhile, one-third of the survey’s respondents admitted that less than 20% of their user bases telecommuted well before the social distancing measure was imposed to prevent the spread of COVID-19.

About 11% said those who worked remotely are “road warriors.” Amid the coronavirus pandemic, 40% reported an increase on the attacks on their remote footprint. There’s the other 10% who reported a rise in coronavirus-themed scams. Before the week ended, 81% committed that at least 50% of their workforce would be WFH. But there’s a problem, about 47% of those who wish to shift their workforce to remote working admitted that their security teams don’t have any emergency plan in place.

Common Issues Raised

The respondents that the top challenges they faced when it comes to securing their remote footprints is end user security awareness. Another issue is having sensitive data housed outside the office and transmitting it through the open internet. Insufficient foot print visibility, VPN costs, mobile security, and patching as well as updating are a few other concerns.

Cybersecurity Challenges

There are many moving pieces. Companies need to deal with confidentiality, integrity, and availability concerns. Businesses who wish to move to remote working needs to ensure regular updates and upgrades as well as timely intervention responses.

They also have to have a plan in place in case the device is lost or stolen. They also have to keep some type of patching cycle and that includes possibly non-domain devices into that.

Short-term Cybersecurity Strategies

Even with the Bring Your Own Device (BYOD) approach, you still need to enforce policies and implement strategies like remote management and monitoring. A lot of administrators are finding less resistance to such arrangement since the coronavirus pandemic. You also need to tell users that even with BYOD, they are still susceptible to online attacks, which could compromise their personal accounts, data, and information during this challenging period. Always remind them that these measures are for their protection and the organizations.

SpartanTec, Inc. Benefits

  • Ease of administration - Ideal for remote situations
  • Protection model - No intervention required, managed service, No rollbacks to manage, No suspicious files
  • Can augment existing protection or provide coverage of BYOD or critical infrastructure while you’re away
  • Stay on top of patches while workers are remote - No need for WSUS or manual local management
  • Secure remote device data - Full disk encryption with BitLocker

Call SpartanTec, Inc. if you need the help of an IT expert to make sure that your cybersecurity isn’t compromised once you move to WFM amid the coronavirus pandemic.

SpartanTec, Inc.
Myrtle Beach, SC 29577