As I sit down (in my home office) to write this, I am hyper-aware of the rash of vendors using the current global health emergency as a reason to pitch their wares, so let me begin by sharing the same “Priority #1” that I have shared with my team: the health of you, your family, your co-workers and your community. Please listen to the real experts and respect their recommendations around social distancing, hygiene, travel….
After several customer conversations this past week, I also want to share some recommendations from security leaders for whom I have a lot of respect in the hopes of increasing understanding across our industry of how to best face this highly unique challenge. I believe the IT industry – vendors and practitioners – have an opportunity to deliver a kind of workplace resilience never before available to the global economy.
Themes related to “The Future of Work” have helped define modern approaches to Insider Threat Management and have been the driving force behind the growth of ObserveIT – both as an independent company and now as part of Proofpoint. For example, the “gig economy,” the rise of knowledge workers, cloud-connected workers, the globalization of the workforce, and changes in office culture have all impacted the relationship between employees and enterprises. These trends have also posed unique challenges for IT security organizations tasked with managing a rapidly evolving threat landscape where people are the new perimeter.
All of these themes and trends have accelerated in the last few weeks at a pace that no one could expect. As the world adapts to this new reality, modern IT must step up and deliver a level of workplace resilience that has never before been demonstrated. It’s more important than ever to ensure that security teams have the ability to detect and respond to behavior that is outside of security policy or expected work activity.
Here are five recommendations for meeting the security challenges posed by the new widespread work-from-home reality:
- Refresh Training on Security Policies and Best Practices
Security starts with an educated user base. Remote employees working with new access tools for example VPNs, are more prone to making negligent mistakes – particularly as they necessarily mix work with home life. It’s a good time to refresh security awareness training programs.
- Limit Remote Workers’ Access to Only the Applications and Information They Need
While this is a cornerstone of any Insider Threat program, it becomes even more important when workers are remotely accessing sensitive systems and data – sometimes with less control over the endpoint and the network on which they are accessing it. For this reason, if your enterprise has not already, now is the time to implement and enforce a policy of least privilege access across your entire workforce.
- Test your Secure Remote Access Strategy
Protecting connectivity to corporate applications and data is fundamental to securing remote workers. Whether using a traditional VPN or modern software-defined perimeter, access and endpoint security must address the needs of a workforce striving to stay productive while working from home. Learn more about Proofpoint’s complimentary offer to Help Secure Your Remote Workforce at Proofpoint | Meta Networks.
- Leverage Multi-factor Authentication as Broadly as Possible
Protecting access to data and resources with MFA is a necessary failsafe – even when connecting from protected endpoints. As remote workers are connecting from either BYOD or sanctioned endpoint devices, the risk of credentials being compromised becomes greater. Ensuring sensitive applications and infrastructure remain protected with a strong authentication strategy becomes even more important in today’s distributed work culture.
- Ensure Visibility across Broadened Footprint
As new endpoints come online – whether physical or virtual – visibility needs to extend to cover them. As workers adjust to a new online work paradigm, they become more vulnerable to improperly managing sensitive data and potentially more vulnerable to being compromised by outside actors. So, enterprises must endeavor to have visibility across the broader footprint of endpoints in their organizations today.
I appreciate some of these recommendations are the bread and butter of modern security programs. But now is the perfect time to re-assess your enterprises security policies and strategies from the perspective of a widespread work-from-home reality – a necessary response to our changing circumstances.
Best wishes for resilience to your organization and most importantly, health to you and your teams.