Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical Security

Navigating the Unknown: Lessons Learned in the Full-Scale Transition to Remote Work

By Ian Pitt
The Cyber 101 Discussion
May 21, 2020

Many weeks have passed since organizations around the globe closed their physical doors and transitioned to full-scale remote work. This ‘new normal,’ as many are calling it now, has brought upon countless changes for IT teams, from managing fully disparate teams to providing all employees with access to the tools they need to perform their jobs remotely – all while ensuring the company’s assets remain protected.

When this global shift took place, many organizations weren’t ready for such an impactful event and had to face increasing challenges that most never thought possible. After several weeks of navigating these unprecedented times, several key lessons have emerged.

 

Remote Work: The Challenges and Learnings

As the transition to remote work commenced, one big question arose - how to keep business running smoothly? This question demonstrated the need for a business continuity plan, the first and most important lesson of all. There are critical steps to keep operations running when a crisis hits an organization – whether a natural disaster or a temporary disruption in a specific region. However, given the size of the disruption faced with COVID-19, many businesses realized they weren’t ready to execute these changes easily.

Many struggled to equip employees with the technology they need to do their jobs from afar and had to quickly develop a ‘zero-touch device delivery’ plan. IT teams had to revisit their compliance and security policies reacting to the new challenges, threats and simply to respond to a whole new way of working. And, while collaboration tools have proved to keep teams connected, many had to spend precious time implementing these tools and onboarding staff. Weeks into this transition, those with comprehensive business continuity plans have seen the benefits of having this guidance in place, and those who did not have learned that this is a critical tool to have for their organization moving forward.

As new remote work technology implementations took shape and many more employees began working from home, capacity and scalability tested companies even further. Network traffic increased exponentially. At LogMeIn alone, remote access solutions saw a 300 percent increase in use, video conferencing and meetings usage spiked 10x over 2020 norms, and remote support usage is surging 50 percent week over week. IT teams had to escalate their real-time monitoring in order to manage capacity, bandwidth and drive resources where needed. This spike in usage has created a new baseline for companies’ capacity and bandwidth and has caused many companies to advance their technologies faster to keep up with this new normal for demand.

New remote workers also introduced new vulnerabilities, not only because of new devices and networks accessing company data, but also because of increasing threats. Phishing attacks have skyrocketed with a 350 percent increase since the beginning of the year. The potential impact on credentials and sensitive information has now become palpable. As a result, IT and security teams have had to balance their regular processes like ensuring up-to-date firewalls or deploying the latest patches, with more intensive threat reporting and behavior and network activity monitoring, being extra conscious of the significant role ‘shadow IT’ plays in this new normal.

Additionally, many have had to create or increase current training programs to encourage ‘cyber smart’ behavior and password hygiene, as well as implementing and deploying new systems including multi-factor authentication (MFA) or password managers that would help protect employee and company data. 

As we moved into what is arguably the largest experiment in full-scale remote work in modern history, leaders didn’t anticipate how much management systems and communication would change. Management had to modify how some of the most important in-person meetings would take place from afar by setting up “virtual war rooms.” What were once siloed departments before COVID-19, have been forced to collaborate more. Virtual coordination between IT, Security, HR, and Business Operations has been key to achieving business continuity.

Finally, the importance of communication cannot be overstated. Adaptation has played an important role on this front, from keeping constant and open communication between leaders to formulate a plan for the business, to communicating with all employees to keep them informed about the company’s next steps and to keep morale high.

 

What Lies Ahead

We are past the first wave of issues and challenges the full-scale remote workforce presented. We have learned a great deal about how resilient companies are to big disruptive events such as this one, what they excelled at, what the lacked and how they actually respond to the new needs of their employees and the business.

With no set end date for the pandemic, we will see new challenges arise. Organizations will need to starting thinking about their new normal and remember what they have learned from this remote work transition and use those lessons to their advantage. What changes will they keep in place? What processes did they not have, that will need to be refined. From access to critical resources for remote workers and a security architecture that addresses the new normal, IT teams will need to ensure their environments remain agile as we continue to navigate these uncertain times.

KEYWORDS: business continuity COVID-19 cyber security information security remote work risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ian pitt

Ian Pitt is the Senior Vice President and Chief Information Officer at LogMeIn, where he is responsible of global Cyber Security, Governance, Corporate IT, Business applications and Product Operations. He has over 20 years of experience leading business process management and optimization, as well as industry compliance/governance processes and cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-law-freepik1170x658.jpg

    Lessons learned in the five years since the Equifax data breach

    See More
  • education-training

    Cybersecurity lessons learned in the K-12 sector

    See More
  • Name tags

    5 IAM considerations and lessons learned in the insurance industry

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing