The number of “information workers” working partially or fully remote has been on the rise for years. This spring, the COVID-19 pandemic has pushed the remote work trend into overdrive. Today, nearly a third of the U.S. workforce, and half of all “information workers,” are able to work from home. One reason they are “able” to work from home is that they are better equipped with collaboration technologies – think Zoom, Slack, Microsoft Teams – to stay productive and connected.
The challenge is the same collaboration technologies that make it easier for employees to get their work done are also making it easier for them to put trade secrets and data at risk – data that security teams are tasked with securing. In fact, more than a third of knowledge workers surveyed for the 2020 Data Exposure Report on insider threat stated that they believe file-sharing has made them more complacent about data security. So, what can organizations do to better protect their data from insider threat in this new remote, collaborative work environment?
Rob Juncker, Code42’s CTO, recently penned an article in Security ToolBox, “How to Securely Scale Insider Threat Management Without Putting Data at Risk: CTO View.” In it, he shares his recommendations for ways organizations can reinforce their insider risk protection capabilities without stifling collaboration.
“The COVID-19 pandemic accelerated remote work trends and serves as a grand experiment for organizations to embrace collaborative technologies to improve productivity and innovation. However, a distributed, collaborative workforce opens organizations to insider data risks by exposing data through cloud-based applications that fall outside security’s visibility and control. Organizations need to change their security approaches to protect their data—building a robust insider threat protection program that relies on the ability to quickly detect, investigate and respond to the inevitable risks to data security.”
Head over to Security Toolbox to read the full article, “How to Securely Scale Insider Threat Management Without Putting Data at Risk: CTO View.”