Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Education & Training

Security complexities of the remote workforce

The global remote workforce as grown more prominent in recent years, presenting a range of unique security challenges.

By Jordyn Alger, Managing Editor
Remote worker

martin-dm / E+ via Getty Images

November 14, 2024

Remote work: love it or hate it, it is here to stay. The global remote workforce as grown more prominent in recent years, presenting a range of unique security challenges.

Rom Carmel, Co-Founder and CEO at Apono, states, “It brings a lot of complexities — specifically complexities when it comes to security — some of which were brought before the move to remote work but accelerated with the move.”

As the remote workforce movement becomes more and more commonplace, security leaders must adapt to the new security difficulties this workforce will bring.


Security complexities of a remote workforce

Any workforce, remote or otherwise, will present its own security challenges. One particular challenge that remote workforces face is the extensive perimeter that must be secured.

“An on-premises environment — like what most organizations used to have — could have a fence put around it to say, ‘Now nothing leaves or enters here,’” Carmel explains. “But with increased migration to cloud, less and less organizations have that kind of environment anymore. When an organization moves to the cloud, it moves to no longer store its data on-premises. With this shift to a global remote workforce, users themselves are logging in, and not from the organization itself. And that poses even newer security challenges.”

When employees work from home, there is no longer one single area that needs to be secured. While this challenge was introduced prior to the growth of the remote workforce via cloud technology, the growing remote workforce accelerated this challenge.

Carmel elaborates on these challenges, saying, “Now you have users that are out of the premise, out of the secure environment, and out of your physical organization — and physical network. So what they're connecting to, the data that they're leveraging, and the compute that they're using is also now outside of the organization's premise and network as well.” 

Security leaders responsible for the safety of a remote workforce must take these challenges into consideration when deciding how to best secure their workers.


Authentication challenges

“From a security perspective, the remote workforce imposes a lot of a lot of complexities,” Carmel asserts. “For instance, we need to constantly authenticate the person that is now logging in, because this computer can be used by someone else that we don't know since we're not seeing who's sitting on the other side of that computer. We also have to consider what type of access and permissions these users are being granted inside of data repositories and applications external to the organization.”

 Rom CarmelWith this shift to a global remote workforce, users themselves are logging in, and not from the organization itself. And that poses even newer security challenges.

Authentication challenges are at the core of remote workforce security threats. Determining whether or not a user is who they claim to be is one of the first lines of defense for an organization with employees spread across the globe.

“The authentication and authorization of these employees working remotely is a big challenge. How do we verify that person is really that person?” Carmel says. “For instance, if an employee’s computer was to get stolen and they’re working remotely, or if their identity was compromised due to a phishing attempt in the organization, that would be a security risk. Authorization is how to make sure that person you know has only the access that they need to be able to reduce the attack surface.”

The importance of proper authentication for a remote workforce cannot be understated. Therefore, security leaders must take the necessary steps to bolster authentication measures.

When considering ways to mitigate these risks, Carmel remarks, “I think it comes to combination of processes and tools. It's not enough to bring in solutions that that are not being implemented, and it's not enough to bring in solutions when there is no security mindset in the organization. So that's why it's a combination.”

When considering authentication security tools, security leaders must take a step back and consider the holistic needs of their organization.

“When we're talking about what type of tools need to be brought in, security leaders need to think about the different layers of how remote workforces are connecting to in order to work,” Carmel says. “There are layers of identity verification and authorization for connecting users, so security leaders should consider tools for the network access itself. Remote workforces need tools that verify identities and only allow access to applications and services that are within the scope of that user’s required tasks.”


Fostering a culture of security in the remote workforce

As remote work becomes more prominent, malicious actors may seek to exploit that growing workforce.

“It is essential to make sure that the people in your company are familiar with security threats that leverage the fact that people are working remotely,” Carmel says.

When managing a workforce that is spread across the globe, it can be difficult to cultivate a strong company culture of security. However, fostering a security culture in the remote workforce is not impossible.

One way security leaders can implement a culture of security is through constant communication. Whether via email, internal newsletters or business messaging apps, security leaders can share security tips and threats on a regular basis. That way, when a remote employee confronts a security threat, they will be more likely to recognize it for what it is.

“A culture of security stems from awareness,” Carmel states. “Security leaders need to get the organization's employees to be aware that this is happening.”

KEYWORDS: authentication remote work remote workforce security culture work from home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Lourve

    The Lourve Heist: What Was the State of the Museum’s Security?

    See More
  • 5 Minutes with Chokshi

    Pay Attention to the Intersection of API Security and AI Proliferation

    See More
  • Lindsey podcast news header

    A Glimpse of the Future: How AI Will Transform Physical Security

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing