How to Keep Remote Workers Secure

Leanr more about JumpCloud's response to COVID-19We’re prepared to help with your COVID-19 response. Learn more.

How can IT admins keep their remote workers secure? This question has grown more complex to answer with the current shift toward mandatory remote work. As organizations focus on supporting their employees from wherever they may be, it’s vital that IT departments keep their employees’ resources secure. As such, the best steps IT teams can take for maintaining organizational security during extensive remote working must revolve around users and their machines. 

IT departments can now leverage a platform to keep identities and systems secure in conjunction with training employees on maintaining a good security posture. Relying on just training your workforce can be dangerous, which is why coupling that with a foundational platform to protect user identities and systems for comprehensive security is a must.

Below, we’ll cover the traditional approach admins took for securing organizations, and how IT teams can best adapt that approach to suit extensive remote working.

The Traditional Approach

Traditionally, IT organizations thought of security as one that involved building a defense that centralized on a strong perimeter. 

With the Windows® domain model, this avenue once made a great deal of sense. IT admins would stand up an Active Directory® (AD) instance and create their domain. They would then gate the domain through both physical access requirements and a firewall for virtual protection. Remote users in this legacy environment needed a VPN to tunnel back into the corporate network to access any resources. 

This pattern of perimeter-based security worked well when most users were on-prem and their resources were Windows-based. However, as the cloud emerged, the pattern began to change. 

Does This Approach Still Work?

As technology advanced, web applications became more critical. Cloud infrastructure like AWS® and Google Cloud Platform™ (GCP) started to eliminate the need for on-prem data centers. Mobile equipment and new platforms like Macs®, Linux® workstations, and iOS/Android devices grew in popular demand within the modern workforce. All of these changes started to erode the traditional concept of the domain. Most admins (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Kayla Coco-Stotts. Read the original post at: