Search

Data protection for remote workers

woman working from home on her laptop

Working remotely has become the “new normal”, at least for the foreseeable future.

Some 1.5 billion people are now working remotely. It seems companies overnight moved into a work-at-home reality, and many workplace experts predict that more and more organizations will continue to rely on remote workers after this pandemic has passed.

Virtual work settings are not new. Companies around the world were already embracing remote work to give employees better work/life balance, lessen the carbon footprint, and drive corporate efficiencies.

According to data from Global Workplace Analytics’ analysis of 2018 American Community Service data, 43% of employees work remotely with some frequency.

Regular work-at-home arrangements have grown 173% since 2005.

The push to remote offices has shed light on IT’s need to scale its security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise.

Today’s remote worker reality presents many IT challenges

From an IT perspective, there are a lot of unknowns involved with managing a remote workforce:

  • WiFi networks and routers commonly found in most homes are more easily compromised than the enterprise-grade equipment in offices, which increases the risk of exposure and inadvertent leaking of corporate and customer data.
  • More and more data is stored in the cloud and CASBs are essential elements of cloud security strategies now more than ever.
  • Corporate VPNs are rarely robust enough to match the growth in remote workforce accessing the network. This can create a productivity bottleneck, which further complicates data protection.
  • Email exchanges will increase, due to the absence of in-person communications and many employees lacking a softphone, which also increases the likelihood that email will contain sensitive information along with potential personal data.
  • The skyrocketing use of video conferencing tools by remote employees has led to a drain on bandwidth in many regions, so people are forced to rely on email for communications during peak hours.

Companies need to ask themselves:

  • How are people accessing data?
  • How are they working?
  • What tools are they using?
  • When they create content, is it intellectual property that needs to be protected?

From the comfort of their home office, employees may fail to take precautions such as using only corporate email. Instead, they might send work files over their personal email to get work done faster – a practice that puts corporate information at risk.

And emailing will only become more critical form of communication for remote staff.

This year, people will send 306.4 billion emails per day, with the number expected to reach 347.3 billion in 2023.

Everyone needs a remote worker security policy

Organizations should develop a remote worker security policy to refresh and inform employees of what’s expected of them when working remotely. Even employees with good intentions might not know what they should be doing to protect themselves and to protect sensitive data and corporate assets.

Avoid workflow roadblocks with proactive planning

In addition, organizations may find needless roadblocks in their workflow if their systems are not configured for remote access.

This can occur with Identity and Access Management systems, data loss prevention systems or firewalls.

Why? Systems can behave differently depending on where and how users are accessing these applications or corporate network resources.

If an organization has not planned for large-scale remote access, things can grind to a halt pretty quickly. – Matthew McCormick, Director of Product Management, Titus

Risks are even greater for small and medium-sized businesses

Small and medium-sized businesses – frequently more at risk for data breaches – are often the least equipped to deal with managing a dispersed, remote workforce.

These firms’ systems, practices, policies and tools tend to be less mature. They also, often rely on a small IT team that can quickly become strained with having to manage remote worker IT calls.

Titus’s data classification products and solutions are uniquely suited to protect data “wherever you are.”

“Titus software is made for this situation. We don’t care how people are working. We will protect the data based on corporate policy. The fact that people are suddenly working remotely doesn’t matter so much to us,” observes Matthew McCormick, Director of Product Management.

Attend our safeguarding remote workers webinar

Learn how to best to serve virtual workers with the latest remote data security best practices by attending our free webinar, Data Security – Best Practices for Remote Workers on Wednesday, May 20, 2020 at 11:00AM EST.

Titus experts Scott Hubert, Titus Vice President of Customer Success, and Steve Healy, Titus Director of Sales Engineering will discuss why it’s key to:

  • Leverage a cloud-based email program. Cloud email solutions allow head offices to push updated protection policies immediately to the field, helping to protect organizational data for any remote workers.
  • Employ cloud-based storage. Storing organizational data in OneDrive, Box etc.. gives employees seamless access to all their data regardless of where they are, and existing workflows remain intact. Any data that is sensitive remains marked as such with all controls still in place.
  • Educate your employees. In times of great disruption your end users will experience heightened levels of stress and may make mistakes they would not have otherwise made. Automation can minimize human error and visual markings can help educate users about how to safely handle sensitive data.
  • Back up key items. It’s vital to leverage classification and to apply metadata that automatically triggers back-ups of valuable organizational data, even when all employees are remote.
Register for the webinar

Additional resources & reading

Gartner has identified Titus as a sample vendor in
10 Gartner Hype Cycles
Gartner has identified Titus as a sample vendor in
10 Gartner Hype Cycles


Titus chevron

How protected is your data?

Meet with one of our experts to assess your needs, and we'll walk you through our solution.

Request a Demo
Hide

Upcoming webinar: Webinar name goes here

Join us on Monday, August 32nd where we talk about this, that, and the other thing.

Details + register

Don't show again

We use cookies to give you the best experience of our website. By continuing to browse the site you are agreeing to our use of cookies. Privacy Policy Accept