Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Cybersecurity issues for returning to the office

By Tiffany Garcia
August 21, 2020

As many employees transfer back to a more traditional business setting from remote work environments, adjustments to cybersecurity protocols are going to be necessary. Organizations will need to evaluate any temporary provisions that were put into place during the COVID-19 pandemic, including any shortcuts that were taken and processes that were circumvented, and whether such protocols should be reversed or enhanced. Companies that deal with sensitive data, such as financial information, health information or any data linked to the personal identity of individuals should be especially cautious, as this type of information is highly sought after by cybercriminals and other bad actors. The following provides a closer look at some of the cybersecurity areas that may need a closer examination.

 

Remote access and network security

Some companies may have already utilized Virtual Private Networks (VPNs) for associates to work remotely at a client site or while traveling. However, as stay-at-home orders forced many out of their offices, accommodations were likely made to facilitate access to systems and data that might not have been traditionally permissible under normal circumstances. During the height of the pandemic, nearly all staff members may have been sent home with a laptop, or been given permission to access network drives, mail servers or databases from a personal device. All instances where permissions were granted to personal devices should be monitored closely for now, reevaluated and ultimately removed when employees have transferred back into the office.

All equipment that was left in the office, such as desktop computers, should be updated with the latest software and scanned for potential malware before use. It is also important to keep track of equipment that was relocated out of the office for remote purposes, specifically devices that contain sensitive information, such as laptops and portable hard drives. Organizations should consider scanning devices for malware and applying patches and updates before reconnecting them to internal networks. The use of offline data storage techniques should be discontinued and regular protocols put back in place to match previous security standards if deviations were allowed when working from home. Data that has been stored offline by employees will also need to be retrieved so that there are no information discrepancies or data loss.

When returning to the office, it is important to determine if the protocols used to accommodate the remote work environment are still necessary. This may have included adding privileges to user accounts or simply a larger amount of data being hosted and transferred outside of the office.

It will also be crucial to ensure that security policies and procedures are documented — or updated for those organizations that already have documented security programs — to reflect the established control environment. Any exceptions or concessions made for those that will continue to access the network remotely or circumvent any established security control should be documented accordingly.

 

Documentation for business continuity

Managers should document any issues identified with remote working arrangements and solicit feedback to address noted challenges and lessons learned in the event that business is disrupted in the future. As uncertainty with the normalization of business environments continues, clients as well as employees will be curious about future business continuity, incident response and disaster recovery plans, as well as how quickly a remote environment can be facilitated again. This is an opportunity for your company to learn from the experience of working virtually and isolate what was effective, and what was not effective, from a technical standpoint.

It is likely that cybersecurity will be a relevant concern for cloud computing solutions, as many companies broadened their use of cloud systems to facilitate a variety of working conditions. Information technology departments will want to stay current on new developments regarding system security so that internal network security can be enhanced to better support employees who may have to complete business objectives outside of the office.

 

Some changes may be here to stay

Whether another emergency situation requires businesses to provide for remote working conditions or employees willingly migrate outside of the office, a careful evaluation of security controls by a third party — such as cybersecurity assessments, vulnerability assessments and penetration testing, or social engineering procedures — will be essential to keep your organization protected from information security threats.

KEYWORDS: COVID-19 cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tiffany garcia

Tiffany Garcia is the national cybersecurity practice leader for CBIZ, one of the nation’s largest providers of risk management, accounting, tax, financial advisory, employee benefit and insurance services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Rick McElroy

    5 minutes with Rick McElroy - What CISOs should know about returning to the office

    See More
  • coronavirus - traction guest

    GAO issues considerations for agencies returning employees to workplaces during pandemics

    See More
  • cybersecurity-freepik1170x658.jpg

    How to execute a successful ransomware tabletop exercise

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing