Go to ecit.com
Go to the front page!

Security in the modern workplace

Written by Josefine Andersen
Nov 3, 2020 12:06:00 PM

After an intense period of working from home, it is obvious that we now work and interact the way we do via cloud services. This specific period is perceived as a vitamin injection for boosting the process of becoming more digital. A process that would normally take up to 5 to 10 years.  


Security requirements  

The level of security is not necessarily sufficient outside the walls of the office. Therefore, the company must facilitate security precautions as it makes it easier for each employee to take their share of the responsibility. 


New forms of fraud 

It was not just us who took a quantum leap when it came to exploiting the technology in the spring of 2020. Similarly, cybercriminals have adjusted their procedures and found new forms of fraud. The degree of cynicism is brutal, and the scope of the problem is growing rapidly. 


How leaders can facilitate security precautions in the modern workplace 

Fortunately, you do not have to give up security to facilitate a productive and collaborative culture when employees work from home or abroad.  

In essence, it is about:  


The user’s devices  

Employees work from a wide range of laptops and desktops as well as mobile devices. In this case, the employees will have access to the company’s data, all possible documents, and programs. The challenge is to keep all these devices secure when being used from home or abroad. Here, it is beneficial for you as a manager to consult with an experienced partner if you do not have the internal resources to handle these kinds of tasks and challenges. 


User accesses 

Username and password alone are no longer sufficient for secure access. Protect your employees’ access by setting up an extra layer of security when logging in. This ensures that unauthorized persons do not gain access even if the user’s username and password have been hacked, for example in the event of a phishing attack.  

With multifactor authentication, the employee must enter a code, answer a phone call or identify themselves through an app or mobile phone. Such an app also allows you to log in using your mobile phone as a pass “password-free” login. Be sure to use a safe and acknowledged app for this purpose. 


Conditional access 

Conditional access allows you to protect employees’ user locations based on several criteria in addition to usernames and passwords. Implementing restrictions based on geography, apps, devices, and/or user status significantly increases security. For example, you can block access from certain countries or unknown devices. 


Company data  

It is crucial to secure your company’s data. As criminals adjust their tactics, it is advantageous to prepare policies to protect your business from cyberattacks. Furthermore, it is essential to ensure that sensitive personal information is protected and that policies are implemented to control access and sharing.  

To protect the company against the leaking of sensitive information when employees work from home, these are initiatives you can implement. By enabling features that help you identify, monitor, and protect sensitive information, you can prevent it from being shared via e-mail or documents. 


How can ECIT help you?  

There are several initiatives you can implement by utilizing the potential of the systems you already have today. But not all services are set up or configured right out of the box, and therefore these initiatives must be formed and specially adapted to your company’s needs.  

In other words, it is crucial to have a plan and follow the changes as they happen. If your company does not already have this knowledge available internally, we at ECIT are ready to assist you in this process.