The Business Bulletin Issue #7 - Focus On Operations & Resources

Page 28

The Business Bulletin

Is your short-term remote workforce technology in for the long haul? The widespread shift to work-from-home arrangements was not deemed to be in place still. But it appears to be heading towards becoming the new norm.

Work patterns have changed so

of organisations plan to shift “at

say they are when they log in, what

much since 2020 began, with one

least 5% of their previously on-site

information is still missing? What

that is unlikely to change is remote

workforce to permanently remote

applications and data are employees

working. According to a recent survey

positions post-pandemic.”

accessing? As budgets tighten and

by Gartner, 41% of employees are “likely to work remotely some of the time post-coronavirus pandemic.” A separate survey found that 74%

Remote support and security continue to be critical now and will be in the future as more employees transition from temporary to

strategy for a large-scale, long-term

a passing phase. It is here to stay.

dynamic workforce:

workforces were not designed for

After 30 years working in IT, Bharat offering the RSA SecurID® Suite. This uses identity insights, threat intelligence and

2. Reduce risks with new identity and more robust authentication

home culture, there were many “band aids” used to get staff up, running and productive during the business disruption. Now, these organisations are considering what is required for the best security in this new reality of

don’t worry about contravening strict rules

validated with visibility

without a progressive work-from-

business context to provide secure access delivers peace of mind to end-users and

1. Identity risk needs to be

long-term success. In organisations

to all their users, across all applications. He to management. With Bharat’s help firms

There are three goals to consider

dynamic, distributed workforce is not

rush to implement large-scale remote

decided to focus on helping businesses by

haste that need a closer look? in the effort to evolve an effective IAM

But many of the tools and

C4 Secure

privileges have they been given in

permanent off-site arrangements. The

technologies deployed during the

Bharat Panchal

workers are asked to do more, what

remote working. As many organisations enter into a

3. Ensure IAM strategy complies with GDPR by leveraging tools like automation As seen in recent months, cybercriminals have wasted no time taking advantage of the current health crisis. They found ways to exploit

on data access and GDPR regulations

future that includes a high proportion

remote workers who are outside of

or about loss of data due to malicious

of remote workers, they will require

the confines of office network security.

new ways of thinking about security,

With remote workers using every

productivity and identity and access

type of endpoint device these days,

management (IAM). While simple

it is essential for security teams to

authentication capabilities may offer

distinguish legitimate devices and

visibility into who remote workers

users from malicious ones.

attacks or plain forgetfulness. 01604 439303 sales@c4secure.co.uk c4secure.co.uk

28 | Issue 7 – Operations and Resources


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.