Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Four Critical Cybersecurity Considerations to Support a Remote Workforce
Cybersecurity

Four Critical Cybersecurity Considerations to Support a Remote Workforce

Robert WoodBy Robert WoodFebruary 24, 20224 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity for a Remote Workforce
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The Covid-19 pandemic has forced organizations around the world to transition to a remote work paradigm. A move that introduced collaboration tools, VPN connectivity, chat apps, and video conferencing to employees who were historically working together in person. This work from anywhere transition is very likely to continue in full or in a hybrid model into the future. Organizations and people have adapted and started to find a new normal.

This article will explore four considerations that cybersecurity teams should be thinking about while working with a largely remote workforce.

Devices and VPN

The move to a remote-first posture likely changes the way services are accessed. No longer is everyone on the corporate network from headquarters. A VPN connection to a trusted network is a solution that’s been around for some time now. In this remote-first paradigm, discussions around bring-your-own-device (BYOD) are also quite prevalent. Should personal devices be allowed to connect to your VPN? How does your preferred security model extend to the consumption of SaaS/PaaS solutions? If SaaS/PaaS solutions are not integrated into a single-sign-on (SSO) that enables managed device checking, the security model may fall apart, depending on your needs. This is expanded on in the next section on authentication.

One other core consideration for device security is whether managed devices are configured and set up to withstand use within expected untrusted spaces. There has been a fairly dogmatic view over the use of “coffee-shop WiFi” or the equivalent untrusted network. This is our new reality, however, so our devices need to be in a position of resilience.

Authentication

Authentication is and has always been a fundamental element of cybersecurity. Gaining access to resources for a distributed remote workforce doesn’t have to be challenging with the rise of robust SSO solutions. Integrating authentication flows into managed devices or BYOD policies adds more complexity, but it can be worth the work. Additionally, setting overarching authentication policies, geared around geolocation, MFA flows, device configuration checks and session limits can help reduce risk. Further, some integrated apps may even benefit from application-specific security policies, which some SSO providers allow you to set up.

Compliance narratives

The world has changed rapidly since COVID-19 first hit. Compliance standards that inform policy and procedures at most organizations have not changed quite so fast. There are controls still that emphasize practices like secure data rooms, trusted networks, and secure physical working spaces. Virtual equivalents are still finding their way to market. Compliance standards from SOC2 to NIST 800-53 have not yet fully incorporated zero trust principles into control language.

Heavily regulated or regulated by extension organizations must strike a delicate balance. Embracing a fully remote workforce is not impossible, but it does mean that security teams need to build the controls and the risk management narratives to accommodate compliance needs.

Improper Use of Collaboration Tools

A user putting sensitive data into SaaS or PaaS tools is one of the most commonly cited concerns associated with the adoption of cloud services. It’s not that these solutions aren’t secure enough to deal with sensitive data. The problem arises when a solution is set up to support one set of use cases or data types and instead gets used for something much more sensitive. This gap creates residual risk.

Security teams need to be thinking about the tools being introduced and the shadow IT that users are standing up to solve their needs. Depending on the kind of data your organization is working with, configuration and data security monitoring needs will change.

Concluding Thoughts

Remote work at scale has had its benefits and its drawbacks. Security teams need to balance data security, accessibility, user experience, and reliability across their organizations. All of this is happening while security teams are also changing the way they work, their tools, and their collaboration patterns.

While the risks and landscape have changed, the opportunity to lean in fully is also tremendous for security teams.


cloud security Cybersecurity cybersecurity as an enabler Cybersecurity channel featured remote teams remote work SaaS
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Microsoft’s Mission to Make Your Company AI First

May 14, 2025

Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live

May 14, 2025

Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration

May 14, 2025

Arvind Krishna’s Next IBM Miracle

May 13, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft’s Mission to Make Your Company AI First
  • Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live
  • Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration
  • Arvind Krishna’s Next IBM Miracle
  • ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.