Remote cyber security: Profiling the five types of user

0
675

Some companies, such as Twitter, have even gone on record to offer employees the opportunity to work from home “forever”, if they choose. The truth is that the pandemic has merely been a catalyst to a transition already in process, rather than a watershed in itself; almost three quarters (73%) of UK employees considered ‘flexible working’ to be the new norm before the pandemic had even plotted its course.

Remote working does, however, bring a host of new realities that businesses must account for before taking the plunge. It’s not as simple as just logging on from home. Changing cyber security dynamics are a key issue that must be recognised when employees work from outside the office. Many organisations rely heavily on legacy solutions such as VPNs, which simply don’t cut it in today’s advanced-threat landscape. Each end user must ultimately be treated as an individual and receive proportionate, appropriate access to an organisation’s network based on their specific job role. This can prove a tricky situation to handle, with contemporary businesses collaborating with myriad number of differing workers: IT technicians, third parties, and consultants to name a…

Read More…