Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Cybersecurity: A survival guide for 2021

By Mike Wilson
remote work
April 28, 2021

Despite the vaccine rollout, it seems unlikely that things will ever return to the way they were before the pandemic. A recent PWC survey found that 78% of CEOs believe that a distributed workforce is here to stay. As a result, organizations must rethink how they can best organize themselves in these uncertain times, remain secure and survive this indefinite period of remote work and virtual interactions.

Many companies are struggling to adapt their security strategy to accommodate the new normal. With remote working now an ongoing reality, there has been a rush to adopt and integrate a slew of new tools and cloud platforms to facilitate collaboration and maintain productivity. However, in the race to connect everyone, security implications are often overlooked. This, coupled with the fact that relying solely on a corporate firewall is no longer a sound security strategy, puts many organizations at risk.

So, what should companies do now to adjust their security strategy? Here are five factors to adhere to that will prevent cybercriminals from taking advantage of the virtual business environment.

1. Adopt a Zero Trust Approach

Organizations need to adopt this mindset now that there is no longer a well-defined security perimeter. All systems must be appropriately secured and require authenticated access from an authorized device, no matter whether they reside on the internal or external network. Businesses should also require that remote employees use a VPN to access corporate resources when they are not physically in the office. This will help mitigate security concerns.

2. Review Security Before Adding Tools

There has been a surge in the adoption of collaboration tools and cloud services to support engagement in our digitally dependent world. Most organizations have prioritized resiliency over security concerns. However, rather than rushing to adopt new tools, IT teams must audit every solution for potential security vulnerabilities and know how to securely configure them before they are activated. In addition, teams must adjust their approach from security enforcer to taking on the persona of a risk advisor-- helping the business understand the security vulnerabilities while supporting a more agile response to the new working environment.

3. Make Multi-Factor Authentication Mandatory

Passwords remain a weak link and are the source of many cybersecurity vulnerabilities. Sensitive systems and data require more than a simple password for security. Organizations need to add additional layers without introducing too much friction to the user experience rather than hoping that one will suffice.

4. Tap into Intelligent Technologies

With the shortage of cybersecurity resources along with escalating threats, harnessing the power of intelligent technologies has never been more critical. The ability of these solutions to process vast volumes of data to identify and predict threats is an invaluable resource for organizations that they can't ignore. Machine learning and bot detection are critical tools for security teams now and in post-pandemic times.

5. Practical Security Training for the Remote Workers

Security training is critical so that employees understand the new risk landscape. The training should aim to help protect both professional and personal data as most home networks are overloaded with a range of different devices. Employees will be more receptive if you present a holistic view of the threats. There needs to be regular tips and tricks that educate on the latest cyber scams and phishing attacks to prevent employees from falling for lures. Setting up a chatbot to address frequently asked questions from remote workers will provide employees with the information they need when they need it without adding any unnecessary burden on the IT team. The simple step of training workers on how to set up a separate Wi-Fi network solely for business devices while working from home will significantly mitigate potential risks from malware on the home network. And, of course, reminding them again of the security implications inherent in jumping on a public Wi-Fi network at the coffee shop.

The working environment has changed forever and organizations need to adopt an agile approach to deal with the new threat landscape. Staying rooted to what worked in the past has the potential to be a recipe for disaster in 2021 when it comes to security.

KEYWORDS: cyber security information security remote workers risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Wilson is CTO & Founder of Enzoic.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • budget

    A post-pandemic guide to cybersecurity budgeting for 2021

    See More
  • convergence freepik

    4 steps to prepare for a ransomware attack: A C-suite guide

    See More
  • SEC0120-cyber-Feat-slide1_900px

    New Year Prognostications: A Perennial Guide for the Perplexed

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing