The Business Bulletin
Is your short-term remote workforce technology in for the long haul? The widespread shift to work-from-home arrangements was not deemed to be in place still. But it appears to be heading towards becoming the new norm.
Work patterns have changed so
of organisations plan to shift “at
say they are when they log in, what
much since 2020 began, with one
least 5% of their previously on-site
information is still missing? What
that is unlikely to change is remote
workforce to permanently remote
applications and data are employees
working. According to a recent survey
positions post-pandemic.”
accessing? As budgets tighten and
by Gartner, 41% of employees are “likely to work remotely some of the time post-coronavirus pandemic.” A separate survey found that 74%
Remote support and security continue to be critical now and will be in the future as more employees transition from temporary to
strategy for a large-scale, long-term
a passing phase. It is here to stay.
dynamic workforce:
workforces were not designed for
After 30 years working in IT, Bharat offering the RSA SecurID® Suite. This uses identity insights, threat intelligence and
2. Reduce risks with new identity and more robust authentication
home culture, there were many “band aids” used to get staff up, running and productive during the business disruption. Now, these organisations are considering what is required for the best security in this new reality of
don’t worry about contravening strict rules
validated with visibility
without a progressive work-from-
business context to provide secure access delivers peace of mind to end-users and
1. Identity risk needs to be
long-term success. In organisations
to all their users, across all applications. He to management. With Bharat’s help firms
There are three goals to consider
dynamic, distributed workforce is not
rush to implement large-scale remote
decided to focus on helping businesses by
haste that need a closer look? in the effort to evolve an effective IAM
But many of the tools and
C4 Secure
privileges have they been given in
permanent off-site arrangements. The
technologies deployed during the
Bharat Panchal
workers are asked to do more, what
remote working. As many organisations enter into a
3. Ensure IAM strategy complies with GDPR by leveraging tools like automation As seen in recent months, cybercriminals have wasted no time taking advantage of the current health crisis. They found ways to exploit
on data access and GDPR regulations
future that includes a high proportion
remote workers who are outside of
or about loss of data due to malicious
of remote workers, they will require
the confines of office network security.
new ways of thinking about security,
With remote workers using every
productivity and identity and access
type of endpoint device these days,
management (IAM). While simple
it is essential for security teams to
authentication capabilities may offer
distinguish legitimate devices and
visibility into who remote workers
users from malicious ones.
attacks or plain forgetfulness. 01604 439303 sales@c4secure.co.uk c4secure.co.uk
28 | Issue 7 – Operations and Resources