Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Security in the flexible working world

By Dan DeMichele
working-remote-office-freepik.jpg
October 19, 2021

Working from home is here to stay for many employees. Even employers, having been put to the test during the pandemic, understand that employees' productivity does not diminish in the home office. In fact, they are even more productive than in the traditional office. As a result, companies can continue to integrate remote work into their operations with a clear conscience, moving to a flexible way of working to provide employees with a mix of home office and office. But this presents even IT experts with new security challenges.


The number of threats from cyberattacks of all kinds has increased rapidly in recent years — from phishing, ransomware and DDoS attacks to social engineering. According to IDG, 66% of IT managers surveyed confirmed that home office employees are exposed to more cyber risks. On this premise, the number of employees working on private, unprotected devices (31%) is also alarmingly high. So the IT help desk also has its hands full, looking after more and more remote worker issues and protecting them from cyber threats. But the key here is to keep the measures as user-friendly and secure as possible. Employees should not be too restricted by the new "work-from-anywhere" and too many work steps.


Creating strong awareness for IT security 

Whether remote, in the office or in a co-working space, all employees must be sensitized to cyber threats. IT managers should educate them about how malicious hackers operate, what gateways they provide them with simply by choosing their passwords, and what steps and tools they can use to combat them. It is important not only to provide training for employees but also to give IT security a permanent place in the corporate culture. This is the only way to create an overarching security culture in the company and ensure that employees understand the value of IT security if it is also explicitly practiced. As a result, employees also embrace the issue of security and behave with caution throughout their working hours, helping minimize the risk of the human factor as a security gap.


Solid password management as a cornerstone

On average, everyone has 30 accounts that need to be protected by passwords. Strong password management is essential whether at home, in the office, or anywhere else in the world. However, employees use a password an average of 13 times. Smaller companies in particular struggle with this. That's according to a recent study by password manager LastPass on the use of passwords in the workplace. As a result, these login data still represent the greatest security risk in companies. 


Considering that data breaches are commonplace in the digital world and that it has been proven that 80 percent of data breaches can be traced back to weak and reused passwords, employees should always be educated about password hygiene.


 Nevertheless, many users often use the same insecure passwords across different accounts. Unfortunately, favorites still include sequences of numbers like "123456" or adjacent key combinations like "qwertz." Combinations with numbers from the date of birth are also not a good idea. With a business password manager solution, companies gain more control over the password behavior of their employees, enabling IT managers and users to avert breaches in good time and keep administration costs as low as possible. Password managers manage all passwords, which users set up individually for a wide variety of accounts, in a secure vault. This is only accessible via a strong master password of the user. Therefore, employees only have to remember one password, which helps avoid insecure, simple passwords and the multiple uses of the same password in different accounts. 


Single sign-on and multi-factor authentication as an additional security layer

The advantage of such password managers is that they offer additional functions, such as single sign-on (SSO) or multi-factor authentication (MFA). With SSO, IT managers can reduce the effort required for password management by significantly reducing the number of passwords that need to be managed. This way, users connect to applications securely without having to enter an extra password. Organizations can thus gain complete control over both passwords and user access, as long as accounts are connected to a password manager via SSO, adding an extra layer of security to logins.


MFA also provides yet another layer of security. When logging in, users must enter another code in addition to the password. This is created at the moment of login and sent to another user's device. A variant of this method uses biometric sensors for fingerprint or facial recognition. Only with this second level of security can the login process be completed by an MFA. Such methods are very beneficial for IT admins because they no longer have to worry about the insecure passwords of their colleagues to secure corporate networks. The entire workforce is protected, but at the same time, can work both in the office and remotely without much performance degradation or complex security processes.


Network access must also be secured

Working remotely also involves a VPN connection in most cases because the ease of use with a single access point and secure data transmission is very intuitive. According to the IDG survey, almost half of IT managers (45%) admit that employees access unsecured WLAN networks. This is due to only marginal protection of the VPN connection. IT administrators should also secure these additionally. 


However, it is precisely the intuitive, simple features of VPN that make it highly vulnerable to cyberattacks. Just one set of stolen login data or one computer compromised by malware is enough to give hackers access to sensitive company data. In the worst case, they can encrypt it and demand a ransom. To prevent this, the VPN connection needs an additional security layer. Again, MFA comes into play for double protection. In this way, companies avoid unauthorized persons gaining access to the network - without additional, complex login processes for employees.


The path to a secure flexible working world 

Remote work has found its permanent place in working life after the pandemic and will retain its importance in the long term. IT must therefore adapt to a flexible IT environment to keep the resulting increase in cyber risks under control. The right tools and features will help them minimize the risk of attack while allowing employees to work productively and securely from anywhere in the world without major restrictions. Organizations should take the higher-risk home office threat landscape seriously and rely on the right solutions to be ready for a secure flexible workforce.


KEYWORDS: cyber security information security multi-factor authentication risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan DeMichele is VP of Product for LastPass by LogMeIn.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Web Exclusive Logo

    Working in the Cloud: Critical Security Questions to ask any SaaS provider

    See More
  • cloud-cyber

    The Shift in Security Operations in a Multi-Cloud World

    See More
  • cyber laptop2

    3 Ways to Get Endpoint Security Back Under Control in the New Remote World of Work

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!