COVID-19 cyber threats: A checklist for a remote workforce

As more employees work remotely, businesses must revisit and revise their cyber defense measures.

This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. 

The COVID-19 pandemic has changed the conversation around remote work.

Today, the challenge is less about gaining flexibility and a competitive edge. Rather, the conversation has moved to social isolation, self-imposed and forced quarantines and sobering questions about business continuity. This is a real challenge in the face of a viral outbreak that is predicted to affect our communities on a level not seen in decades.

Related: COVID-19 changing cyber fraud claim standards

If there’s an upside to this unsettling period, it’s that the same cloud that irrevocably changed the way companies do business in recent years will now help them navigate through this pandemic. By enabling remote work in response to this crisis, companies will emerge nimbler, more technologically sound and more productive.

As more employees — or all employees in most organizations — work remotely, companies must employ security best practices to ensure that the extended reliance on the cloud doesn’t expose sensitive data or cripple daily operations.

Following is a practical checklist of systems, technologies and processes to consider when evolving your organization for remote work and selecting your cloud technology provider.

Securing your remote workforce

There are many remote work strategies and controls companies can implement in order to significantly reduce the likelihood of a data breach, limit exposure of sensitive information and maintain security in a virtual office scenario.

All businesses relying on a remote workforce should be implementing the following security measures in order to ensure the safest possible environment.

Business continuity and disaster recovery

The novel coronavirus is spreading quickly despite the best efforts of government, health care, private business and public organizations. That’s why it’s important for all organizations to include pandemic planning and remote work protocols in place that ensure the continuity of business and to allow organizations to adopt a WFH (work from home) model in the event of an infection or quarantine.

The following measures are key for business continuity and disaster recovery.

Remote access application due diligence

Ensuring secure remote access starts with choosing the right platforms and applications. A major factor that should play into any decision to use a particular application or provider is the security measures offered.

Proper due diligence requires consideration of the following features:

Be proactive

The immediate need to support remote work has brought with it an increasingly complex and risky cybersecurity landscape. Thinking proactively about remote work strategy and controls, business continuity and disaster recovery and application management when choosing or monitoring a cloud provider is the best way to prevent cybersecurity breaches before they happen.

Tomas Suros is a technology advocate working at the intersection of IT and client consulting. With AbacusNext since 2004, he currently serves as global director of product marketing, guiding firms through the process of identifying forward-facing technology options and ensuring the successful implementation of a tailored solution. He can be reached at tsuros@abacusnext.com.

Read more: