Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Managing security compliance with a hybrid workforce

By Derek Kernus
remote workforce

Image via Unsplash

September 15, 2022

Home internet speed. Cameras on or off. Core work hours. These are just a few remote work worries managers now have to consider. While businesses may have dabbled in flexible work arrangements before, it’s clear that widespread adoption of hybrid policies is here to stay — and with it, the need for cybersecurity extends beyond the office walls.


Leading a dispersed workforce requires looking at cybersecurity compliance differently. This often means creating or adjusting policies that employees will follow to keep their identity and devices safe while also protecting your company’s digital assets.


Cybersecurity challenges for a hybrid workforce 

In any organization, the areas most vulnerable to cyberattacks are at the security perimeter, with individual users, devices, and system access points. Securing these endpoints was challenging enough before the pandemic forced workforces to disperse and millions to work from home.


Companies who have continued remote and hybrid workforce policies have pieced together some systems and processes that allow work to be done and basic security standards to be met, yet often admit that they still face challenges.


That’s because cybersecurity is not just a technical problem; it’s also a people problem. And it’s an area of operations that is still rapidly developing, with solutions and best practices often lagging or being developed in reaction to known security vulnerabilities.


While it’s been more than two and half years since remote work had its COVID debut, everyday hybrid headaches for security admins still include:

  • Limiting and securing access to sensitive information and systems
  • Adopting technologies to maintain employee productivity and ensure security
  • Enforcing security policies
  • Handling home network security issues, including unauthorized apps (called shadow IT), bring your devices (BYOD), and unsecured Wi-Fi.


As the software industry rushes to introduce new products and solutions to address these challenges, many companies find themselves hampered by their employees’ cooperation to be the first line of defense.


Recent research indicates that many people still fail to follow basic cyber hygiene practices, like using unique passwords for each account, checking the source before clicking on links, and protecting personally identifiable information.


While these habits are risky enough in personal life, they present a significant risk to companies where credentials and logins hold the keys to the kingdom, from financials to intellectual property to customer data.


Managing the hybrid security risk

By nature, managing a hybrid workforce is more demanding because it requires managers and leaders to be deliberate. They must determine policies and communication for those at work and elsewhere, often with remote work guiding rules and norms around cybersecurity. It’s not easy because this is largely uncharted territory. That’s exactly why cybercrime is so lucrative — they know companies have these security gaps and are willing to pay up and move on.


Managing the risk calls for a rather simple shift in security mindset. Rather than trying to change the behavior of people in your organization, change policies and systems to mitigate risky behaviors. For example, instead of having employees remember the passwords and log in to half a dozen different databases and applications during their workday, the better hybrid security mindset has them log in to a single portal. 


In fact, the best advice for companies looking to maximize the impact of the security dollars — whether in person or hybrid — is to use as many technology controls as possible to mitigate human risk factors. 


But we can’t forget about training. Cybersecurity education for your hybrid workforce is a must-have investment when it comes to defending the business against phishing scams and other communication-based attacks.


The goal of training is to ensure that every employee, regardless of their role, level of access, or location, knows how to recognize and avoid common and new threats and what steps they need to take in case of a breach or hack. A secondary goal is to give hybrid employees confidence that they truly make a difference in their cybersecurity stance; personal investment helps drive more compliant behaviors.


Extremes, including super strict policies, performance-review impacts, and other penalties for security mistakes, can have the opposite intended impact on employee security compliance. Instead of helping hybrid employees do their jobs more securely, they drive paranoia and fear and impact employee performance (for example, employees refusing to respond to emails with attachments or to click on any links).


To help, consider adding planned and random testing to training so hybrid employees can use their best judgment to put what they’ve learned into practice.


The struggle between security and productivity

Finding a “sweet spot” that balances cybersecurity with business needs may take trial and error. However, companies can succeed by recognizing cybersecurity as a business operational concern and not just a technology issue.


Cybersecurity can drive productivity in a hybrid environment, as it helps companies avoid costly breaches and service disruptions that shake customers’ trust and derail operations. But employees don’t have to feel hampered —  or hassled — to be safe.


Here, cybersecurity technology may hold the answer for hybrid work. Already we’ve seen major advances in tools that help us connect and communicate. Now that so many of us want to ensure remote work can be fulfilling, meaningful, and impactful for employees, look for more software, tools and policies to become “best practices” that help hybrid thrive.

KEYWORDS: cyber security hybrid workforce risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Kernus is the director of cybersecurity operations at DTS and holds CISSP, CCSP and CMMC RP certifications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Borromeo

    5 minutes with Michael Borromeo – Cybersecurity best practices with a hybrid workforce

    See More
  • Workforce Security and Compliance Efforts; security leadership, security education, compliance, millennial security and compliance

    Have Your Security and Compliance Efforts Changed Along with Your Workforce?

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing