Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Managing security compliance with a hybrid workforce

By Derek Kernus
remote workforce

Image via Unsplash

September 15, 2022

Home internet speed. Cameras on or off. Core work hours. These are just a few remote work worries managers now have to consider. While businesses may have dabbled in flexible work arrangements before, it’s clear that widespread adoption of hybrid policies is here to stay — and with it, the need for cybersecurity extends beyond the office walls.


Leading a dispersed workforce requires looking at cybersecurity compliance differently. This often means creating or adjusting policies that employees will follow to keep their identity and devices safe while also protecting your company’s digital assets.


Cybersecurity challenges for a hybrid workforce 

In any organization, the areas most vulnerable to cyberattacks are at the security perimeter, with individual users, devices, and system access points. Securing these endpoints was challenging enough before the pandemic forced workforces to disperse and millions to work from home.


Companies who have continued remote and hybrid workforce policies have pieced together some systems and processes that allow work to be done and basic security standards to be met, yet often admit that they still face challenges.


That’s because cybersecurity is not just a technical problem; it’s also a people problem. And it’s an area of operations that is still rapidly developing, with solutions and best practices often lagging or being developed in reaction to known security vulnerabilities.


While it’s been more than two and half years since remote work had its COVID debut, everyday hybrid headaches for security admins still include:

  • Limiting and securing access to sensitive information and systems
  • Adopting technologies to maintain employee productivity and ensure security
  • Enforcing security policies
  • Handling home network security issues, including unauthorized apps (called shadow IT), bring your devices (BYOD), and unsecured Wi-Fi.


As the software industry rushes to introduce new products and solutions to address these challenges, many companies find themselves hampered by their employees’ cooperation to be the first line of defense.


Recent research indicates that many people still fail to follow basic cyber hygiene practices, like using unique passwords for each account, checking the source before clicking on links, and protecting personally identifiable information.


While these habits are risky enough in personal life, they present a significant risk to companies where credentials and logins hold the keys to the kingdom, from financials to intellectual property to customer data.


Managing the hybrid security risk

By nature, managing a hybrid workforce is more demanding because it requires managers and leaders to be deliberate. They must determine policies and communication for those at work and elsewhere, often with remote work guiding rules and norms around cybersecurity. It’s not easy because this is largely uncharted territory. That’s exactly why cybercrime is so lucrative — they know companies have these security gaps and are willing to pay up and move on.


Managing the risk calls for a rather simple shift in security mindset. Rather than trying to change the behavior of people in your organization, change policies and systems to mitigate risky behaviors. For example, instead of having employees remember the passwords and log in to half a dozen different databases and applications during their workday, the better hybrid security mindset has them log in to a single portal. 


In fact, the best advice for companies looking to maximize the impact of the security dollars — whether in person or hybrid — is to use as many technology controls as possible to mitigate human risk factors. 


But we can’t forget about training. Cybersecurity education for your hybrid workforce is a must-have investment when it comes to defending the business against phishing scams and other communication-based attacks.


The goal of training is to ensure that every employee, regardless of their role, level of access, or location, knows how to recognize and avoid common and new threats and what steps they need to take in case of a breach or hack. A secondary goal is to give hybrid employees confidence that they truly make a difference in their cybersecurity stance; personal investment helps drive more compliant behaviors.


Extremes, including super strict policies, performance-review impacts, and other penalties for security mistakes, can have the opposite intended impact on employee security compliance. Instead of helping hybrid employees do their jobs more securely, they drive paranoia and fear and impact employee performance (for example, employees refusing to respond to emails with attachments or to click on any links).


To help, consider adding planned and random testing to training so hybrid employees can use their best judgment to put what they’ve learned into practice.


The struggle between security and productivity

Finding a “sweet spot” that balances cybersecurity with business needs may take trial and error. However, companies can succeed by recognizing cybersecurity as a business operational concern and not just a technology issue.


Cybersecurity can drive productivity in a hybrid environment, as it helps companies avoid costly breaches and service disruptions that shake customers’ trust and derail operations. But employees don’t have to feel hampered —  or hassled — to be safe.


Here, cybersecurity technology may hold the answer for hybrid work. Already we’ve seen major advances in tools that help us connect and communicate. Now that so many of us want to ensure remote work can be fulfilling, meaningful, and impactful for employees, look for more software, tools and policies to become “best practices” that help hybrid thrive.

KEYWORDS: cyber security hybrid workforce risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Kernus is the director of cybersecurity operations at DTS and holds CISSP, CCSP and CMMC RP certifications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Security’s 2025 Women in Security

Security’s 2025 Women in Security

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Borromeo

    5 minutes with Michael Borromeo – Cybersecurity best practices with a hybrid workforce

    See More
  • Workforce Security and Compliance Efforts; security leadership, security education, compliance, millennial security and compliance

    Have Your Security and Compliance Efforts Changed Along with Your Workforce?

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing