According to a recent report from McKinsey, in April alone, an estimated 62% of those employed in the United States had started working from home due to the pandemic. In comparison, that percentage was just 25% before COVID-19 became a seismic event in all our lives.
While there are very real benefits to remote work—beginning with companies being able to keep the lights on during the pandemic—one major drawback is ensuring company data is protected.
Even in the best of times, protecting sensitive information requires diligence. In the current environment, many employees typically not accustomed to working from home often will be doing so without adequate data security and protection training. Having the right technologies, policies, and governance strategy is more crucial than ever—let’s take a closer look.
Dive Deeper: The In-Depth Guide to Boosting Your Competitiveness Through Workplace Modernization
Increasingly, companies of all sizes are striving to democratize their data.
In my opinion, the goal of data democratization is to ultimately increase the velocity of insight. To increase that velocity to insight, people throughout your organization need access to the same data.
Just reading this is probably making you sweat as an IT organization, and we haven’t even scratched the broader surface involving external contractors, external partners, and cross country/continent access.
While the value and competitive advantages of data democratization are proven, we cannot overlook the fact that it increases every organization’s risk profile. Further complicating the scenario is the compounded risk of an increasingly remote and dispersed workforce. For many enterprises, the rush to enable remote employees and contractors has led to gaps in the entire data governance process.
According to numbers compiled by Statista, more than 160 million records were exposed through data breaches in the United States in 2019 alone. And that number was actually much smaller than the previous year, when the amount of records exposed topped a whopping 470 million.
Most data breaches can have a significant impact on an organization. Beyond substantial fines and, in some cases, congressional hearings, allowing customer information to be exposed creates a distrust that can tarnish a brand for months if not years.
At a high level, the foundation to a successful, scalable, and resilient data security governance framework should consist of at least the following foundational pillars:
Each of these pillars—which should be in place even in normal times—have taken on a heightened importance in our present reality. That means the first step every organization should take to protect their data is to review their existing framework, protocols, policies, and procedures.
This review should be holistic and touch every segment and aspect of how an organization gathers and uses data such as:
Taking these steps should be one of the most important decisions for any organization that has been forced to embrace and/or scale remote work during this incredible period of change for all industries and verticals.
If your enterprise doesn’t currently have the capacity or resources to conduct a thorough assessment, you should consider partnering with a technology solutions provider like Redapt who has the capabilities and expertise in place to guide your organization through every step of the process.
Once you’ve completed your review, the next step is to implement a sound strategy for remote work.
Setting up security compliance, authentication, and access for employees—as well as external vendors and third party contractors—can take days or weeks.
Shipping managed devices, especially with border lockdowns and the current shipping delays, is a major challenge.
Not being able to manage identities (including outside vendors and contractors), having an outdated single factor authentication, a lack of integration between various security mechanisms, and a lack of zero-trust network segmentation can greatly impact productivity and increase security risk.
Not having permissions and auditing policies in place for shared files, or insufficient audit trails and logging policies, can lead to substantial security risks.
Within these four categories, there needs to be acceptance that some tried and true existing technologies could be outdated.
For example, if you need to deploy on-prem VDI, make sure to stick with industry leaders. You will also want to apply a layer of additional security features that may be lacking from such vendors, but are security features that can be managed and monitored effectively within your existing security paradigm.
The cultural shift to remote work adoption and all its various facets is likely going to maintain momentum for the foreseeable future. By focusing on protecting data now, enterprises can mitigate the potential for operation disruptions and major threats to security.
Find the information you need to successfully modernize how your organization operates, along with how you can avoid common pitfalls along the way. Click here to read our in-depth guide to boosting your competitiveness through workplace modernization.