Endpoint Management and Security In a Work-From-Home World

Network administrators have long been stretched thin in their attempts to maintain global endpoint security settings, configurations, and patching. Now that most, if not all, of their organization’s employees are connecting remotely, the job has become even more difficult.

Once end-users move beyond the relative safety of their office buildings, they’re essentially out in the wild. They might be using their own devices rather than standard-issue machines to connect to the corporate network, and conforming to IT policies is probably not their highest priority right now. Perhaps their kids are playing on their devices, or maybe they are surfing the net in their downtime, taking corporate-maintained endpoints to new, potentially dangerous sites. And these are just some of the new complications IT administrators face on the end-user side. It becomes even more complex when you consider the implications of widespread remote connectivity on network performance.

COVID-19 Creates Fresh Cyber Security Challenges as Employees Work From Home

The Threat

The recent surge in Work-From-Home, triggered by the COVID-19 crisis, is here to stay and the first sign of it is that "WFH" has been added to the alphabet soup of jargons crowding the technology industry. WFH, however, has also created a fresh set of challenges for organizations to protect their intellectual assets from cyberattacks. It’s a no-brainer to say that our home networks are far more vulnerable than enterprise networks. Companies are leveraging this crisis to meet immediate needs as well as for building more lasting, longer-term access to a variety of resources in the cloud as well as in the enterprise data center.

As the world logs on to enterprise networks from home, the demand for more secure remote access for employees is at an all-time high. Organizations must prepare for possible cyberattacks on our home IT networks to exploit its vulnerabilities. They need to monitor IT use for signs of malicious behaviour, safeguard sensitive data and assure maximum compliance with privacy and regulatory requirements. Also, the extensive use of cloud services necessitated by the COVID-19 crisis, both on-premise and public, will compel enterprises to reassess this ecosystem and take additional steps to protect it.