Search
Close this search box.

Blog

Remote Working & Security Challenges

Samir Desai examines how recent world events have put remote working and its security implications at the top of the ICT agenda. His security playbook offers up tactics for protecting end-users.
October 9, 2020

Remote Working & Security Challenges

Let’s face it – remote working is here to stay. What was a distraction and an afterthought for ICT managers at the end of last year is now an integral part of any go-forward enterprise networking environment. The benefits of enabling a remote, borderless and telecommuting workforce are obvious in terms of employee well-being and maximized productivity. Prospective employers now look to offer flexible, remote working as a real benefit to attract the best talent.

Most IT teams have built their security infrastructures over the years specifically to protect enterprise networks and the information within them. With the sudden rise in remote working, corporations needed to rely on Virtual Private Network technologies for employees to continue to be able to gain access to enterprise networks from outside of the traditional office LAN environment.

Remote working is here to stay. What was an afterthought for ICT managers at the end of last year is now an integral part of any go-forward enterprise networking environment.

Unfortunately, cybercriminals also continue to develop new and sophisticated ways to take advantage of increased remote mobility in order to gain access to networks and valuable data. The volume of cyber incidents targeting newly remote employees through email phishing tactics and compromised end-user devices has reached record levels.

A typical home working environment can be a localized mixed-use network of corporate devices, highly insecure IoT or personal devices and shared accounts. This offers an ideal foundation for the potential exfiltration of company data and other nefarious cybercriminal activity. As a result, the so-called “attack surface” has increased substantially with the growth of remote working. This brings with it a whole new set of challenges in the war against cybercriminal activity with secure remote networking and risk management becoming the primary imperatives.

A secure remote working playbook

Here are a few tactics to consider when it comes to protecting remote end-users — and, by extension, the enterprise business:

  1. Education: The single most important element in keeping confidential data safe is remote user awareness. Keep employees informed, not only about what they should do, but also about why they need to do it. A handbook should include best practices such as enabling two-factor authentication and requiring VPN login to apps and programs containing sensitive information. Consider defining an Acceptable Use Policy (AUP), so employees know what websites, apps and networks are permitted for accessing data, to avoid potential threats.

    The single most important element in keeping confidential data safe is remote user awareness.

  2. Permissive access: Another risk area is how to implement and manage corporate policies that govern who accesses the network. A simple “one-size-fits-all” approach that gives every remote user the same level of privileged access to their network resources, regardless of whether they need it, presents potential security risks. Striking the right balance between user access management and effective, secure remote access to on-premises resources, hybrid cloud environments, and business applications using policies is key. Working with a managed service partner, who can help define and implement granular policies, can go a long way toward establishing the right, robust security posture for remote workers. A simple “one-size-fits-all” approach presents potential security risks. Striking a balance between user access management and secure remote access using policies is key.A simple “one-size-fits-all” approach presents potential security risks. Striking a balance between user access management and secure remote access using policies is key.

    If remote working cannot be restricted to a VPN, then there’s the risk of opening services directly to the internet for hackers to exploit. Any new internet-facing application needs to be planned, understood, secured and tested before use. Enterprises should always strive to balance the need for cybersecurity against the requirement for a more accessible internet-based and cloud-centric application environment.

  3. Balance productivity with security: The business still needs to operate, albeit in a different mode. For that to happen, the secure end-user experience needs to be maintained, especially when dealing with a globally distributed workforce spanning borders and even continents. Consider how remote users can locally access their key applications and data with minimal latency impact using a globalized secure remote access platform. Flexibility in augmenting additional remote users as the need arises via a simple per-user seat commercial model should also be a consideration going forward.

About GTT

GTT connects people across organizations, around the world, and to every application in the cloud. Our clients benefit from an outstanding service experience built on our core values of simplicity, speed, and agility. GTT owns and operates a global Tier 1 internet network and provides a comprehensive suite of cloud networking services. We also offer a complementary portfolio of advanced security services.

ovum banner

Related RESOURCES

partners-with-envision-ft
Webinar

Partners Win with GTT Envision

What is GTT ENVISION and how can you leverage this exciting approach to Network as a Service? Watch the webinar to learn all about GTT Envision.
envision-webinar
Channel Partner Webinar

Partners Win with GTT Envision

Join us to learn about the GTT Envision platform and its game-changing capabilities.
Team of Professional IT Developers Have a Meeting, Speaker Shows Growth Data with Graphs, Charts, Software UI. Shown on TV. Concept: Software UI Development, Deep Learning, Graphs, Charts.
Guide

GTT Named Managed SD-WAN Leader in ISG 2024 Network Report Evaluating German Service Providers

ISG Provider Lens™ report evaluates 26 enterprise WAN service providers and ranks GTT in a Leader position for Managed SD-WAN enterprise network connectivity.
Hand touching Secure Access Service Edge icon on smartphone virtual screen background, password, network, framework and support technology in office. SASE secure access service edge concept.
Guide

GTT Named Managed SD-WAN Leader & SASE Rising Star in ISG 2024 Network Report Evaluating U.S. Service Providers

ISG Provider Lens™ report evaluates 26 enterprise WAN service providers and ranks GTT in a top Leader position for Managed SD-WAN enterprise network connectivity. GTT is also ranked as a Rising Star Product Challenger for its Secure Access Service Edge (SASE) Capability, GTT Secure Connect.
Fortinet white paper
White Paper

SASE is a Journey – Not a Silver Bullet

In this white paper, learn how leaders are adapting to evolving business continuity demands. To stay ahead of threats, teams must view securing their Network and Security ecosystems as a continuous journey. Secure Access service edge (SASE) framework is the path to stronger cyber security.
IT engineers checking servers in server room
White Paper

Why Technology Partners Matter In Uncertain Times

Technology advancements support 5 key areas of manufacturing. Leveraging managed services providers to support and secure the network infrastructure that enables these advancements helps achieve these positive business outcomes.
Robot welding in car factory
White Paper

Get The Lowdown On The Smart Factory & The Next Wave of Innovation

Manufacturers understand that they must stay up to date with the latest developments in technology to be competitive. At the same time, technology is moving fast. Find out more about Industry 4.0 and the Smart Factory.
Business Data Analysis working in Business Analytics and Data Management System to make report with KPI and metrics connected to database. Corporate strategy for finance, operations, sales, marketing.
White Paper

How Managed Network Services Make A Critical Difference For Operations

Manufacturing is a high intensity industry. Network-led solutions help solve the everyday problems manufacturers face. Smart factory initiatives improve efficiency and continuity, with cloud- based connecting all users and locations of a manufacturing operation
Photo of two robotic arms doing work in a factory assembly line
White Paper

How Manufacturers Can Reap The Rewards of Network-Led Optimization

Manufacturers understand the technology they use must remain current and cost efficient. These are the fundamentals of modern manufacturing operations.
Young farmer or agronomist standing in wheat field beneath irrigation system and using a tablet
White Paper

Five Ways Retailers Can Win Using Managed Services Partners

In this listicle, we explore five ways that retailers can adapt by outsourcing to a managed service provider. Here are five big wins for retailers.

OUR GARTNER RATING

Gartner Peer Insights logo
4.2


62 Reviews

88%
as of the last 12 months

Talk to an Expert

Interested in learning more about GTT products & services? Please complete this short form to schedule a call with one of our sales consultants.

Thank you for your information. One of our sales consultants will be in touch with you.

Scroll to Top