5 Steps to Setting up and Securing Your Remote Workforce
Now that the reality of working from home during the COVID-19 emergency for an indefinite period of time is starting to sink in, the best course of action organizations can take is to ensure they have the proper measures in place to scale up and scale down a remote workforce as needed.
Even outside the current crisis, a growing number of employees are choosing to telecommute instead of venturing into the office day in, day out every week. In fact, the number of employees that work from home has increased dramatically during the past couple of decades—173% from 2015 to 2018, according to GlobalWorkplaceAnalytics.com. On top of that, while many would rather collaborate in an office environment, up to 80% of employees would like to work from home at least part of the time. This means employees generally favor work environments that give them the freedom and flexibility to work and connect to people and technologies, on their own terms.
On the back end, there’s a lot of pressure to keep systems up and running when employees are trying to access company resources all at the same time. Securing these connections poses an even bigger challenge, as decentralized control makes it difficult to fully protect remote users from malware threats aiming to steal valuable company data. As seen in the news lately with the uber-popular video conferencing application, Zoom, any pre-existing security vulnerabilities within the application can open the organization up to increased security risk and compromise sensitive information.
Here are five steps that can help you make the transition to a secure remote workforce as painless as possible.
Step 1: Provide easy access to applications.
Number one on the list is providing your remote workforce with quick access to business-critical applications, like Office 365, Salesforce.com and Jira. And you’re in luck–the majority of applications used today are cloud-based. However, your end users have to keep track of an overwhelming amount of web URLs and separate passwords.
With an Identity & Access Management (IAM) solution like OneLogin, single sign-on (SSO) provides users with a single dashboard for accessing all their applications. They only have to remember their OneLogin password to get access to their everyday resources. This is done by leveraging open standards like SAML and OpenID Connect that allow admins to enforce security policies such as Multi-Factor Authentication (MFA) across their user base via the OneLogin admin portal.
Step 2: Give employees multiple ways to communicate quickly and efficiently.
Communicating with one another quickly and effectively is even more challenging now that we’re all working from home. Consider implementing a formalized policy around instant communications and video conferencing tools like Zoom and Slack.
This is where an IAM solution can help you centralize access and security policies for all or a subset of your users and applications. In the case of “Zoombombing,” you can ensure only authenticated users who have an account can join meetings. You also benefit from having a centralized place to provision and deprovision users in real time for end-to-end user lifecycle management, which ensures no one has lingering access once they are no longer with the company.
Step 3: Implement a “security first” mindset.
When all your users and their corporate-owned machines can no longer depend on the safety of your internal network, a number of security issues arise. For one, you may offer employees a virtual private network (VPN) that provides an encrypted tunnel to your internal network so they can access company resources. But are you 100% confident that
- Page 1
- Page 2