How secure is your work-from-home set-up?
Employees working from home rarely have the same firewalls, network-based intrusion detection and other defences integral to their office spaces. This scenario exposes the gap in security of the one place we feel safe in—our own homes, writes Vishal Salvi, CISO at Infosys
Humanity has woken up to the realisation that we can feel so defenseless in the face of calamity, which is spilling into our work lives. We are looking at a future where we have migrated from less than 10 percent to nearly 100 percent of our workforce to remote working mode. This new way of conducting business comes with an inevitable discomfort of cyberattacks targeting devices outside the safety of our office networks. Employees working from home rarely have the same firewalls, network-based intrusion detection, and other defences integral to their office spaces. This scenario exposes the gap in security of the one place we feel safe in—our own homes.
It is not surprising to know that digital infrastructure has not been stress-tested before in an exponentially stretched situation such as the Covid-19 crisis. But is our cybersecurity preparedness enough to evolve our IT infrastructure in this scenario?
In addition to the technology, policies are placed under the scanner in a bid to make them more relevant for this new reality. Companies must educate the remote workforce on the risks, company privacy and security policies, guidelines, and essential monitoring process information. With the new remote working landscape riddled with unexpected moves from cyber criminals, users need to be alerted and protected against malware designed to harm their devices or software.
Another popular method is for organisations to closely monitor the remote devices for any cyber threats or data breaches. Remote monitoring and management solution stack can provide unified control and visibility into the entire IT infrastructure, including servers, networks and endpoints. However, the right to monitor remote workers comes with several limitations, including obtaining the consent of the employees and the notification of surveillance with specified limits on the monitored areas.
Utmost care must be taken to avoid monitoring guidelines violating the right of privacy of remote workers. Furthermore, organisations are doing all they can to prevent endpoint breaches on employees’ systems, frequently locking access to resources, blacklisting websites, and conducting time consuming security-awareness tests. This can be oblivious to the not-so-insignificant costs it entails in terms of employee productivity. Additionally, amplifying help-desk capabilities with intelligent self-service will drive higher service capacity and lower cost per service-request for the scaling remote workforce.
On a broader perspective, employees working remotely represent the true front lines of organisations today, and play an important role in streamlining process efficiency and security. That said, businesses will need to flex their digital muscle and consistently reiterate their cybersecurity protocols and procedures to embrace this new way of working in a robust and secure manner. With this in place, we can truly create a resilient and assured digital future for our organisations.