It’s all change for business data security
Originally posted on Access Cloud Hosting Services Blog 3 June 2020

It’s all change for business data security

It might sound like a bit of a cliché, but the reality is that robust business data security really is a journey not a destination. Now, more than ever before, as businesses deal with the explosion in remote working combined with new and increasingly sophisticated threats, business data security policies must evolve. And quickly. Protecting the most important business asset – it’s data – must move to the top of the IT priority list.

Back in March when the lock down was first introduced, few businesses really expected that the emergency changes they had to make just to keep employees working from their homes would be required for the long term. The shift was necessary but felt temporary, and most hoped that a return to “normal” would be possible sooner rather than later. But what is becoming clearer, as the business community now takes its first small steps to navigate its way back to work, is that some restrictions are likely to be in place for quite some time. Not only that, the working landscape has shifted significantly, and it is doubtful it will ever be possible to revert to exactly how things were before.

For those IT and business leaders actively considering the long-term viewpoint, security is high on the agenda. New security approaches are clearly needed to respond to the new normal. That means looking at the practicalities of what is possible in order to keep staff working, whilst at the same time ensuring that effective security is maintained.

This is easier said than done as it requires moving away from the enclosed site-based infrastructure and desktop set-up with physical security which so many businesses have relied on for so long. The new normal for work is most likely to involve a hybrid of remote and site-based working. That sounds simple in principle until you consider that prior to the pandemic, many businesses only offered limited remote access to some systems to a small proportion of the workforce. Others offered no remote access at all and everything was protected within the secure site network.

But going forward, there are a host of considerations that impact business data security. The three below are just the tip of the iceberg:

  1. Remote working could become the only way of working for some employees and, depending on job function, secure remote access will be required for all the systems needed for each role.
  2. It is likely that security protocols must be evolved to cope with a combination of company devices and individual employees’ own devices. Maintaining security across a mixed estate gives added complexity and will involve a certain amount of trust on both sides.
  3. The numbers of people working remotely may need to flex and change, perhaps as Government guidelines are eased in or out in response to the spread of disease, or as business requirements and resources are flexed to meet expanding or contracting demand.

The combination of wide-scale access to various systems along with flexible and changing requirements make the security response more complex than ever.

Join us for a webinar on Tuesday 16th June 2020 at 10am, when we'll be discussing how to build a robust and resilient IT infrastructure that underpins business continuity planning after Covid-19.

要查看或添加评论,请登录

Lee Power的更多文章

  • Manufacturers must fight back against the cyber-criminal onslaught

    Manufacturers must fight back against the cyber-criminal onslaught

    It’s clearly an understatement to say that UK manufacturers are under immense pressure right now. The constraints of…

  • Scenario planning: why you need to forecast different models

    Scenario planning: why you need to forecast different models

    As lockdown slowly begins to ease and some businesses take the first tentative steps towards returning to work, finance…

  • Mitigating risk

    Mitigating risk

    In the final edition of the blog I look at how to mitigate any risks from migrating to the cloud. There is always a…

  • A step-by-step process

    A step-by-step process

    In this edition of the blog I will provide a step-by-step process for migrating to the cloud. Whichever supplier you…

  • Beginning your journey to the cloud

    Beginning your journey to the cloud

    In this edition of the blog we look at how to begin your journey when considering migrating to the cloud. Clarity is…

  • Business barriers and pain points

    Business barriers and pain points

    In this edition of the blog we look at the business barriers and pain points when considering migrating to the cloud…

  • Making the case for cloud migration

    Making the case for cloud migration

    In this edition of the blog we look at the making the case for migrating to the cloud. The decision to migrate to the…

  • Strategies for Migrating to the Cloud

    Strategies for Migrating to the Cloud

    In this edition of the blog we look at the different strategies for migrating to the cloud. In 2011, Gartner identified…

  • How to ensure a successful, safe and secure migration to the cloud

    How to ensure a successful, safe and secure migration to the cloud

    Introduction This is the first of a series of blogs, where I will be discussing Cloud migrations, and how to get it…

  • Protecting your personal and business data when working remotely

    Protecting your personal and business data when working remotely

    Whilst so many more people than usual are working from home, it’s vital that businesses do everything they can to help…

社区洞察

其他会员也浏览了