Autore: SealPath Team
According to Gallup Human Resources consulting firm, 54% of American workers work remotely part time or continuously. Many studies claim that remote workers are more productive and profitable than office-based employees. In Europe, the data for occasional remote workers compared to total workers is much lower, although there are huge differences by country.
Among the advantages that have led companies to adopt remote work has been the reconciliation of work and family life, increased productivity, avoidance of stress when travelling to work, and cost reduction.
In a short space of time Covid19 has imposed itself on these advantages in recent weeks and has forced many companies to take measures to remote work and minimize downtime.
However, not everything is an advantage when it comes to remote work. Among the barriers to adoption are isolation and disconnection from the organization and culture of the company (lack of visibility in terms of business management, isolation), lack of visibility and control over worker responsibility (is he doing what he has been asked to do?), difficulties in communication (including changing time zones), maintaining separation between personal and work life and cybersecurity (keeping workers and company data safe).
Due to the threat of the Covid19, many companies have rushed to make work easier for employees. Companies are using, among others, the following technologies to facilitate remote work:
But, what about information security? It is important to enable productivity and communication tools, but we must not neglect security: Use of secure authentication systems, VPNs to avoid publishing remote access to servers, etc.
The urgency for companies to implement remote work measures has led, for example, to the establishment of unsafe communication channels from workers’ homes to company systems. For example, enabling access to servers via RDP (Remote Desktop Protocol), without an adequate VPN connection.
One thing is clear, the organization’s sensitive information is going to be more dispersed and widespread than ever before. It will be carried from the company’s systems to home computers with improvised and minimal security measures that cannot be at the level of corporate security systems.
Now sensitive information has been moved to the cloud, home computers, etc. How can I easily and conveniently put measures in place to keep it protected and under control, even if it is on computers outside the organization?
SealPath, Protection and Control tool allow you to have your data encrypted, even if it is on a remote computer, control access permissions (view only, edit, copy and paste, etc.) and audit access to information. Not only that, but you can revoke access to certain protected information if necessary to prevent possible data leaks.
By following these steps with SealPath you can have your information protected within minutes and under control on all employees’ computers, even if they are at home:
Once users access the information from their home computer, they can do so with the permissions assigned to them in that policy. Documentation will be encrypted, and all access will be authenticated.
With SealPath, it’s easy to get your data to travel with the security your business needs. Sensitive documentation will be out, but with corporate security “attached” to it. The work environment may not be as secure as it usually is, but the security enhancement SealPath easily applies eliminates this risk.
You can read this article in SealPath website.