How to Support & Secure a Distributed Workforce

Leanr more about JumpCloud's response to COVID-19We’re prepared to help with your COVID-19 response. Learn more.

Employees around the world are shifting to telecommuting right now, which means IT leaders need to strategize about how to provide secure resource access. This moment is also a catalyst for reimagining how IT can manage workforces whether they’re based in the main office, in a remote office, at home, or scattered around the world.

We’ll first detail concrete steps organizations can take right now to enable their users, and then we’ll examine forward-thinking ways IT admins can reassess their architectures to meet new challenges and manage distributed workforces moving forward. 

Assess Hardware & Track It 

A key first step to enable distributed users is to ensure they have systems — primarily Mac®, Windows®, and Linux® — they need to effectively do their jobs. Admins also need to identify measures they can take to secure those systems, whether they’re in the office, in a coffee shop, or in a users’ home office:

  • Ensure users have systems they can take home and on-the-go, as well as other office necessities like charging cables and additional monitors.
  • Use an asset management tracking system to account for at-home hardware. The International Association of Information Technology Asset Managers (IAITAM) has recommended organizations sign out and track all IT assets, as well as tighten BYOD policies as they shift to remote work. 
  • Identify methods to secure and troubleshoot systems, including a remote command runner, remote desktop software, and remote monitoring and management (RMM) tools.

Identify Digital Tools & Strategies to Use Them

Once an organization has equipped users with the hardware they need, the next step is to ensure they have the software and digital tools they need as well:

  • Implement digital collaboration tools and/or make sure you’re using them to the fullest extent. For example, offer guidance for virtual meetings, such as having cameras turned on so users can maintain face-to-face interaction wherever they’re based.
  • Define a clear IT process for users who wish to adopt new tools as a way to limit shadow IT by users (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Cassa Niedringhaus. Read the original post at: