As remote working continues and number of workers and devices scale, sloppy data management will create challenges says Rick Vanover at Veeam.
The pandemic has shifted the spotlight back on that pesky security issue that organisations have struggled with for years. The problem is getting worse. Studies show the number of connections spiked suddenly during the pandemic, as workers handle more mission-critical tasks from remote locations.
Workers are not only hooking up more laptops, tablets and phones to give themselves more work flexibility – they are getting sloppier about the way they manage the connections under their control. They are replacing devices more quickly than they used to, upgrading phones every year or two.
But consumers do not always wipe old phones when they give them away, sell them or trash them. Data from that confidential presentation does not go away by itself.
It is time for organisations and workers themselves to step up. They need to protect data and ensure it will be there for future use by backing it up. But it cannot stop there. Here are some strategies businesses can deploy to protect and manage the growing issues imposed by the era of ultra-connectedness.
Strengthen remote access
This is job one for IT departments – especially with remote work promising to play a bigger role in the future. Equipping corporate networks with VPN’s for sensitive data is a good start. Just as important is the follow-through.
Sophisticated role-based management tools can enable employees to work productively while also blocking them from accessing information outside of their assigned areas or sharing strategic documents. Train employees in the do’s and do nots of accessing information remotely, and regularly review your strategy to ensure it is meeting your corporate needs.
Manage devices cradle to grave
Too much sensitive information is sitting on devices waiting to be had. IT departments need to take the lead on any corporate-issued phones and laptops – equipping them with security features up front and doing thorough wipe-downs before issuing to a new user. This goes for loaner devices, as well.
Workers connecting to network information need to do their part, too. Kill old corporate emails from home devices and before selling or destroying models make sure to purge any materials.
Encryption, two-factor authentication
Security breaches are all too common – and most are preventable. Basic steps like encrypting sensitive documents can protect consumers from disaster scenarios where customer data or a highly classified report inadvertently falls into the wrong hands. Passwords provide a moderate level of protection – and, if they are updated regularly and managed properly, they can do the job.
But if you are accessing important information that could compromise the company in any way, equipping all private devices with two-factor authentication is a better option.
Doubling on diligence
Phishing forays are not new, but they are still dangerous. In an era where corporate assets are increasingly at risk, and hackers are waiting for that one opening to slip through, it is important for workers to remind themselves to be more diligent than ever.
IT departments can circulate refresher notes and conduct periodic trainings reminding people to exercise basic cautions like do not enter credentials online, do not click on documents from unknown sources and when in doubt contact IT. Keep the time-tested slogan in mind: Trust but verify. You do not want to find out the hard way that a communication is not what it appears to be.