Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

BUSINESS TECH | Working from home brings a whole new dimension to cybersecurity

0
laptop-user

by
Oscar Visaya,
Country Manager
Palo Alto Networks

Any comparison between corporate IT infrastructure preparedness during the severe acute respiratory syndrome (SARS) and the coronavirus disease 2019 (Covid-19) should be treated lightly. During the SARS period 17 years ago, working from home was an unworkable concept due to bandwidth limitations and clunky tech. Cybersecurity, like the office environment, was desktop orientated and mass market smartphones and tablets were at least five years away.

Today, the situation is different.

There are dozens of ways to access networks, remote offices are common, the mobile office is a reality, there is an abundance of bandwidth, and cybersecurity harnesses artificial intelligence and other advanced technologies.

This month many organizations in the Philippines have allowed staff to work from home due to health concerns in light of the Covid-19 outbreak. This duty of care seeks to protect the health, safety and security of employees while maintaining business continuity.

Yet enterprises need to ensure there is a similar duty of care applied to IT infrastructure; and try to avoid taking a flexible approach.

In many organization, there would be staff who are required to operate outside the office environment and these mobile workers would access the corporate network with authorized devices and apps in a disciplined environment.

Employers have strict Bring Your Own Device (BYOD) guidelines and policies for staff wanting to use personal devices to access corporate networks and systems inside the office. These policies require every BYOD device — smartphone, tablet, laptop etc. — to receive authorization by the IT department before connection to the network is allowed.

But when staff are allowed to work from home to enable business continuity, this raises serious cybersecurity issues.

This is evidenced in “The State of Cybersecurity in Asia Pacific” survey by Palo Alto Networks; almost half (47%) of respondents stated their biggest cybersecurity challenge was their employees’ lack of cybersecurity awareness.

Imagine if those employees are working from home and accessing devices used by the family for business purposes. Corporate cybersecurity is designed to protect IT
infrastructure but, unless there is a special arrangement, this security apparatus is limited to the workplace.

This exposes the employee to potential exploitation by cybercriminals and puts their employer at risk.

Having employees inside the security bubble and preventing cyberattacks requires investment in time, resources and equipment. The whole premise of being able to work from home to maintain business continuity, falls apart if the employer and employee fail to maintain the same level of security and practices as at the usual workplace.

Here are some tips to secure the work from home environment:

Devices. Only allow authorize devices to access the corporate network for business execution.

Education. Regularly reinforce to employees about the need to exercise the same level of cybersecurity discipline when working from home. There is an opportunity for corporations to develop cybersecurity materials for workers to share with their families to encourage and instil awareness.

Training. Irrespective of where the employee is accessing the network, the provision of up-to-date training and testing employees’ knowledge about cybersecurity is critical. Even better if these tests reference working from home and highlight traps to avoid.

Firewalls. Install next generation cybersecurity solutions as these are designed with remote workforces in mind and allow the extension of firewall-based policies. This gives employees an opportunity to access sensitive resources securely anywhere in the world.

Cloud. Employees using cloud-delivered applications and services must only use those approved by their employer and accessed via the corporate network.

Common IT infrastructure architecture secures the corporate headquarters, branch offices, data centers, and remote access, preventing a multitude of cyberattacks. The trend now is for network security to be delivered via the cloud, protecting users, data, applications and sensitive information.

This development would help to eradicate the differences between office and home working from a cybersecurity perspective. For now, corporations need to ensure ‘business as usual’ efforts extend to staff working from home, especially when it comes to cybersecurity.

Contribution to Tech Sabado

Leave a Reply

Your email address will not be published. Required fields are marked *