Nelson Cicchitto, Avatier founder and CEO says:

The work-from-home world introduces new IT security challenges. To keep up with these challenges, it is critical to understand the challenge first. The latest industry research shows that data breaches are now costing companies millions of dollars. In the United States, each data breach now costs about $8.6 million. On a global level, the cost is $3.9 million per data breach. Unfortunately, the COVID-19 pandemic has made IT security even worse.

With so many threats on the horizon, it can be challenging to know where to focus. Fortunately, you can achieve a lot by focusing on two types of threats: phishing and malware. Applying training and software to mitigate these threats is vital to keeping your data safe.

There are multiple ways to address the reality of large-scale remote worker security. Let’s assume that a significant share of your workforce wishes to work remotely for the foreseeable future. In that situation, IT leaders need practice options. Consider the following solutions to make IT security effective in a remote work

1. Prevent Identity-related Security Breaches
Ultimately, preventing identity-related cybersecurity breaches requires a full identity and access management program. For example, you need to provide password management training to employees so they know how to create robust passwords. IT needs the right tools like Avatier Identity Anywhere to systematically monitor identity in the organization.

2. Prevent Security Problems Related To Access Privileges
An account breach of a single user with extensive access privileges can do a lot of damage to your organization. That’s why managing access privileges is a critical security practice. However, it is not realistic to expect IT staff to review security privileges for every user manually. Instead, you need to leverage a specialized IT security software solution like Compliance Auditor.

Tip: When employees leave their current job for a different role in the company or leave the company, their access privileges need to be updated quickly. To systematize this practice, engage with human resources to determine when employees change or leave the organization. For more guidance on this topic, check out our article: Reduce Employee Fraud Risk: 5 Ways to Improve Offboarding.

3. Implement Better Password Security for a Remote Workforce
With a remote workforce, the right tools are needed to reset locally cached passwords. The user’s computer may keep a critical corporate password stored locally, which creates a security risk and an IT challenge. You can solve this risk by using Identity Anywhere to secure credentials across different computing environments, including Windows and iOS.

4. Use VPN Security To Reduce Attacks

A virtual private network (VPN) is a vital tool to improve your security. On its own, it will not prevent all attacks. Nonetheless, it is a powerful tool that needs to be in place to support remote employee security. Find out more about the benefits of VPN technology in our article: What You Need To Know About VPN Security.

Tip: Make sure your employees know how to turn on their VPN security. Since using a VPN can impact internet speeds, some employees may be tempted to skip using a VPN. It is important to reinforce the value of using a VPN to maintain security.

5. Test Your IT Security Controls Regularly

IT security threats keep changing every month. You can find out if your practices have a gap by getting attacked, or you can protectively detect that gap yourself. To minimize the chance of an expensive data breach, use an IT security testing program that considers remote worker security concerns.

For example, you might decide to give employees a knowledge test quarterly to see if they are aware of phishing risks. Some companies also send simulated phishing messages to their employees to evaluate whether employees are equipped to detect and respond to these such threats. Finally, check whether your controls are working. For example, are managers reviewing user access privileges in their department regularly? Such access reviews can go a long way toward closing security vulnerabilities before they become a problem.

6. Review Remote Employee Physical Security Practices
The security systems and practices outlined above cover the fundamentals of adequate IT security for remote work. However, it is also worth taking another look at physical security practices. For example, do you have a process to prevent employees from printing sensitive documents at home? If not, applying controls to such printing is worth taking a closer look at since it may lead to unauthorized data disclosure.


  • I'm just a regular girl from Georgetown, TX. I love working out & writing. Actually, I have an unnatural obsession with writing.