The Security Spotlight has turned to Remote Workers
Ensuring mobile security for your remote workers
With more workers looking to continue remote working after the current pandemic, the spotlight has turned on how businesses can help their employees to stay secure when outside of the relative safety net of the office.
Before the pandemic, figures from Eurostat showed that 10% of employed people in the EU were workng remotely. That’s around 25 million people across the EU28. But with that number now turned on its head with the majority of the EU workforce having to work from home in recent months, the implications for mobile security are significant.
A Gartner survey of 229 human resources managers on 2 April revealed that while 30% of their employees worked remotely at least part of the time before the coronavirus pandemic, 81% or more are currently working remotely and 41% are likely to do so at least some of the time once a return to normal working is permitted.
With this rapid and radical change in the work environment, comes a new cyber-related security threat. The migration of the workforce from offices with enterprise networks that are closely monitored and secured to largely unmonitored and unsecured home wifi networks is bound to be an opportunity to good to miss for cybercriminals.
So what can businesses and their mobile workforce do to protect their valuable business data?
There are a number of tools available to stay one step ahead of the next threat. Working together, IT admnistrators and the remote workers themselves can ensure their mobile devices are as safe as possible. Here are 5 things to consider:
1. Mobile Device Management (MDM)
Mobile security is only as strong as its weakest link. A good MDM solution makes it easier to secure and manage mobile devices through their entire lifecycle. The three stages of MDM are provisioning, production, and decommissioning. Each stage involves a comprehensive set of procedures to help ensure enterprise mobile adoption goes smoothly and IT policies are set and followed. From a security perspective, it can be used to:
- Restrict a mobile device to a single app or suite of apps to ensure device security, corporate data privacy and worker productivity.
- Automatically configure device connectivity (3G/4G, Wi-Fi and VPN) to ensure secure communication from any location.
- Enhance location services to allow the business to view the current location of all online devices, while offline devices report their last known location until they reconnect.
- Deploy precise user permissions to specify which individuals in the organisation have permissions to access, alter or upload and download information.
2. Security software and regular data backups
Mobile workers face the same, and possibly a greater threat, from all the familiar security tricks that enterprises have had to combat, such as phishing attacks and ransomware. To ensure that data is not at increased risk when working remotely, virus security software should be up to date and provision made for regular data back-ups to protect information.
3. Physical device security
Just like other electronics, mobile computing devices are vulnerable to theft from the home or when working on the move. While asset tracking and recovery are important features made possible with MDM, Panasonic TOUGHBOOK devices, for example, also allow for the physical “locking” of hardware. Also look for device manufacturers that can offer docks and mounts that can secure the device to a desk or in a vehicle. Lastly, consider multi-factor authentication for device access.
4. Good employee training
The biggest potential threat to security is people themselves and when under pressure or operating in a rapidly changing and new environment these threats can be exasperated. So ensuring best practice guidelines are issued to all remote working staff is a must and refreshers in cybersecurity awareness training should be considered.
5. Creating a Custom Security Solution with BIOS-embedded Technologies
Consisting of a persistence module that’s installed during the device manufacturing process (e.g., Panasonic computers have BIOS-embedded security from Absolute built-in) and an application agent installed by the organisation itself, BIOS-embedded technologies provide an advanced level of protection for mobile workforces.
Using this application agent, IT can preset these agents to automatically delete sensitive company data or lock a device if it hasn’t connected and reported into a server within a proscribed number of days. Even if a mobile device has been wiped, the BIOS-embedded persistence module can provide forensic evidence for recovery once the application agent has been activated and the device is reconnected to the Internet.
In addition, businesses could look to deploy mobile computing devices based on Microsoft’s latest generaton of Secured-core PC. Designed with deep integration between hardware partners such as Panasonic and software and featuring the most advanced CPUs available, Secured-core PCs are intended to handle mission-critical data in some of the most data-sensitive industries. A Secured-core PC is a modern Windows device that comes with the highest level of hardware, software and identity protection ready right out-of-the-box.
Solving the Mobile Security Challenges of Remote Working
With new home workers reporting in Personnel Today that 77% feel their employers have done a good job handling the remote work transition and three-quarters saying they believe their manager trusts them to be productive from home, this mobile workforce change looks set to stay in some form in the “new normal”.
Read more insights…
article
AI-ENABLED TOUGHBOOK G2 REVOLUTIONISES RUGGED TABLET MARKET
TOUGHBOOK G2mk3 is Panasonic's first tablet featuring an AI-enabled Intel® processor, whilst offering market-leading customisation and modularity.
blog
Transports Metropolitans de Barcelona relies on Panasonic Connect technology
Our recent collaboration with Transports Metropolitans de Barcelona (TMB) has been under the spotlight for the implementation of advanced technology to improve traffic control on the city's bus lanes.
blog
Navigating Together Towards a Brighter Future: Our Commitment to Recognition2024
As businesses embark on a new financial year, now is a great time to reflect on the resilience and innovation that European organisations have shown over the past 12 months - in the face of unparalleled challenges - and to move forward with optimism.
article
Business Views Wireless Connectivity As A Route To Productivity But Challenges Remain
European businesses expect to see an average 32% boost in productivity in the three years after implementation of the latest wireless technology.
Sorry there was an error...
The files you selected could not be downloaded as they do not exist.
You selected items.
Continue to select additional items or download selected items together as a zip file.
You selected 1 item.
Continue to select additional items or download the selected item directly.
Share page
Share this link via:
Twitter
LinkedIn
Xing
Facebook
Or copy link: