Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Cellular Connectivity at the Forefront of Network Security

By Donald Schleede
SEC1219-cybergap-Feat-slide1_900px
June 15, 2020

From large corporations to small, local business, COVID-19 is creating a new global workforce paradigm. For the foreseeable future, working from home is central to “the new normal,” as people express reluctance to return to public transit and crowded workspaces – 41 percent of employees are likely to work remotely post-pandemic according to Gartner.

While it now seems obvious that the remote work model will last for an extended period of time, many companies are still in a reactive mode. They have largely focused on setting up employees with devices and giving access to corporate networks as quickly as possible, with less attention on anything else. Just a few months later, priorities have shifted.

As the number of people working remotely increased, so do the threats that companies face – compounded by the race to just get people online. The Internet Crime Complaint Center (IC3) receives 4,000 cybersecurity complaints a day, four times its pre-COVID pace which puts more pressure on IT, security teams and leadership to maintain organizational cybersecurity.

How can organizations protect their proprietary data and confidential communications in the face of aggressive cyberattacks against an expanded remote workforce?

 

Upgrading Network Security for the Distributed Workforce

As the volume and sophistication of threats, remote access becomes a bigger concern because workers are relying on connections that are not provisioned with the advanced security that protected them in the corporate and office settings. But that doesn’t mean that there’s nothing IT professionals can do to secure remote workers.

Cellular connectivity options bring several security advantages to the distributed workforce and much-needed support to IT teams dealing with network capacity and uptime challenges. Cellular routers and extenders deliver connectivity that is provisioned and managed by corporate IT – complete with encryption, firewall, VPN capabilities and a variety of security protocols. These can provide a critical layer of security that enables employees to continue business as usual while reducing security risks for themselves, their colleagues, and ultimately the organization.

As you make decisions about secure cellular technology, consider the following:

  • Home Wi-Fi routers won’t suffice. The consumer-grade security features of home Wi-Fi routers are simply not strong enough to protect corporate assets. By contrast, commercial-grade cellular routers and extenders help IT expand and enforce critical security policies to the edge of the corporate network.
  • Virtual Private Networks (VPN) are only the first step. The first stages of the COVID-19 pandemic drove many organizations to deploy or expand their VPN. VPN tunnels with multiple options, such as IPsec and OpenVPN, are the standard secure connectivity option for most organizations, typically providing remote access to centralized resources. However, local internet browsing still uses a local connection, creating risky scenarios for remote employees. With cellular routers or extenders, encrypted VPN tunnels run between remote work environments and the corporate network, providing greater security as well as remote configuration and administration.
  • Location matters – when it comes to connectivity.  Whether employees are located in outer-tier suburbs, rural areas or even in dense urban settings, cellular extenders enable them to isolate the best signal reception in their work environment and then run a single secure cable back to their home office.
  • Centralized security management. This is the critical factor for any distributed enterprise environment. IT teams must be able to monitor and remediate any unauthorized configuration changes or device resets and track data consumption and device performance. Cellular connectivity includes centralized management capabilities. A single-pane-of-glass view to monitor and access remote devices is essential. The ability to open or close the network or perform updates to security protocols and firmware must be part of a future-proof security plan.  

For those already betting on cellular technology (or looking into it) to improve their workforce security, the goal is to ensure cellular communication devices can be quickly deployed, centrally managed and pre-loaded with secure configurations. This helps limit who can access the network and improves content filtering and blocking for protection against malware, viruses and ransomware. Secure VPN tunnels from the edge router back to the corporate data center provide end-to-end data encryption.

 

The Future of the Workforce is Here

We don’t know when this remote work season will draw to a close, but we cannot sit passively and wait for it all to end. We must start planning now for the post-pandemic era.

The COVID-19 situation represents an ideal (albeit, unwanted) test of future work environments, preparing us to face an expanded distributed workforce. Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offers further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.

KEYWORDS: cellular communications COVID-19 cyber security information security remote work

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Donald Schleede is Information Security Officer at Digi International. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Large venue security can enhance COVID-19 response with facial recognition technology

    Security at the forefront of reopening - How implementing facial recognition tech now can help bolster security later

    See More
  • The Royal Wedding of Prince Harry and Meghan Markle

    A security network fit for royalty – how Kinetic Mesh guaranteed security at the royal weddings

    See More
  • The Power of Connectivity

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing