The Security Spotlight has turned to Remote Workers
Ensuring mobile security for your remote workers
Before the pandemic, figures from Eurostat showed that 10% of employed people in the EU were workng remotely. That’s around 25 million people across the EU28. But with that number now turned on its head with the majority of the EU workforce having to work from home in recent months, the implications for mobile security are significant.
A Gartner survey of 229 human resources managers on 2 April revealed that while 30% of their employees worked remotely at least part of the time before the coronavirus pandemic, 81% or more are currently working remotely and 41% are likely to do so at least some of the time once a return to normal working is permitted.
With this rapid and radical change in the work environment, comes a new cyber-related security threat. The migration of the workforce from offices with enterprise networks that are closely monitored and secured to largely unmonitored and unsecured home wifi networks is bound to be an opportunity to good to miss for cybercriminals.
So what can businesses and their mobile workforce do to protect their valuable business data?
There are a number of tools available to stay one step ahead of the next threat. Working together, IT admnistrators and the remote workers themselves can ensure their mobile devices are as safe as possible. Here are 5 things to consider:
1. Mobile Device Management (MDM)
Mobile security is only as strong as its weakest link. A good MDM solution makes it easier to secure and manage mobile devices through their entire lifecycle. The three stages of MDM are provisioning, production, and decommissioning. Each stage involves a comprehensive set of procedures to help ensure enterprise mobile adoption goes smoothly and IT policies are set and followed. From a security perspective, it can be used to:
- Restrict a mobile device to a single app or suite of apps to ensure device security, corporate data privacy and worker productivity.
- Automatically configure device connectivity (3G/4G, Wi-Fi and VPN) to ensure secure communication from any location.
- Enhance location services to allow the business to view the current location of all online devices, while offline devices report their last known location until they reconnect.
- Deploy precise user permissions to specify which individuals in the organisation have permissions to access, alter or upload and download information.
2. Security software and regular data backups
Mobile workers face the same, and possibly a greater threat, from all the familiar security tricks that enterprises have had to combat, such as phishing attacks and ransomware. To ensure that data is not at increased risk when working remotely, virus security software should be up to date and provision made for regular data back-ups to protect information.
3. Physical device security
Just like other electronics, mobile computing devices are vulnerable to theft from the home or when working on the move. While asset tracking and recovery are important features made possible with MDM, Panasonic TOUGHBOOK devices, for example, also allow for the physical “locking” of hardware. Also look for device manufacturers that can offer docks and mounts that can secure the device to a desk or in a vehicle. Lastly, consider multi-factor authentication for device access.
4. Good employee training
The biggest potential threat to security is people themselves and when under pressure or operating in a rapidly changing and new environment these threats can be exasperated. So ensuring best practice guidelines are issued to all remote working staff is a must and refreshers in cybersecurity awareness training should be considered.
5. Creating a Custom Security Solution with BIOS-embedded Technologies
Consisting of a persistence module that’s installed during the device manufacturing process (e.g., Panasonic computers have BIOS-embedded security from Absolute built-in) and an application agent installed by the organisation itself, BIOS-embedded technologies provide an advanced level of protection for mobile workforces.
Using this application agent, IT can preset these agents to automatically delete sensitive company data or lock a device if it hasn’t connected and reported into a server within a proscribed number of days. Even if a mobile device has been wiped, the BIOS-embedded persistence module can provide forensic evidence for recovery once the application agent has been activated and the device is reconnected to the Internet.
In addition, businesses could look to deploy mobile computing devices based on Microsoft’s latest generaton of Secured-core PC. Designed with deep integration between hardware partners such as Panasonic and software and featuring the most advanced CPUs available, Secured-core PCs are intended to handle mission-critical data in some of the most data-sensitive industries. A Secured-core PC is a modern Windows device that comes with the highest level of hardware, software and identity protection ready right out-of-the-box.
Solving the Mobile Security Challenges of Remote Working
With new home workers reporting in Personnel Today that 77% feel their employers have done a good job handling the remote work transition and three-quarters saying they believe their manager trusts them to be productive from home, this mobile workforce change looks set to stay in some form in the “new normal”.
Read more insights…
blog
The Impact of Urbanization on the Railway Sector and the Role of Rugged Devices
As global urbanization accelerates, with a 25% population increase expected by 2050, the railway sector faces unprecedented challenges. By 2045, urban populations will be 1.5 times larger than today, driving the need for reliable, high-speed transportation solutions. In this context, rugged devices for the railway sector are becoming indispensable for ensuring smooth operations and maintaining high service standards.
article
PANASONIC TOUGHBOOK PIVOTAL TO TURNER TWINS’ ELECTRIC PARAMOTOR WORLD RECORD ATTEMPT
Professional adventurers Hugo and Ross Turner are relying on TOUGHBOOK rugged devices during their historic world altitude record attempt for a tandem electric paramotor in the French Alps.
article
REALISE WHAT’S POSSIBLE WITH PANASONIC TOUGHBOOK AT THE EMERGENCY SERVICES SHOW 2024
Panasonic’s customisable rugged TOUGHBOOK solutions, including the latest 33 and G2 devices, will be demonstrated at the UK’s premier emergency services event.
blog
5G networks now – opportunities, challenges, and hopes for the future
The emergence of 5G technology has been a hot topic in the tech world for the past five years. With promises of faster download speeds, better connectivity, and the potential to revolutionise our industries, it offers clear benefits to businesses. Chris Turner took the opportunity to speak to James Weaver from Cradlepoint, a division of Ericsson, about 5G networks today, the challenges with adoption, and its potential going forward.
Sorry there was an error...
The files you selected could not be downloaded as they do not exist.
You selected items.
Continue to select additional items or download selected items together as a zip file.
You selected 1 item.
Continue to select additional items or download the selected item directly.
Share page
Share this link via:
Twitter
LinkedIn
Xing
Facebook
Or copy link: