Gartner 2020 Market Guide for Insider Risk Management Solutions | Get the report →
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support
Code42 Logo
  • Products
    • Incydr™ Data risk detection and response for insider threat Product Overview right arrow icon
      • Features
      • Detection
      • Investigation
      • Response
      • Use Cases
      • Remote workforce monitoring
      • Departing employee monitoring
      • IP theft detection
      • View All
      • Information
      • Product Plans
      • Deployment
      • Integrations
      • Developer Portal
      • Trust & Security
      • Services
    • CrashPlan Cloud Endpoint data backup & recovery for the enterprise
  • Solutions
    • Insider Risk
    • Data Exfiltration
    • Incident Response
  • Company
    • About
    • News
    • Careers
    • Leadership
  • Resources
    • Resource Center
    • Reports, eBooks, Videos
    • Events & Webinars
    • Customer Stories
    • Product Resources
    • Integrations
    • Developer Portal
    • Trust & Security
    Data Protection: Code42 vs. DLP Leave DLP behind with a better, risk-based approach to protect data. Learn more right arrow icon
  • Blog
  • Get Started
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support

REMOTE WORKFORCE

4 Steps to Enabling Your Business Stakeholders to Understand Security in the Remote Collaboration Culture


5 MIN READ

SHARE

Mason Swenson

Director, Product Management

I’ll be honest, I’m not waiting with bated breath for the next Forrester or Gartner study on data risk and cybersecurity. I don’t always find the report suggestions practical for organizations like ours. But sometimes, we see data that makes us stop and think about how we’re actually responding to the changing nature of data risk. And that’s just what happened when a prominent industry analyst firm highlighted at an event this winter that 80% of CEOs are changing their company’s culture to accelerate their digital business strategy – ultimately, to grow. Combine that with a global health crisis that propelled us within a matter of days into a remote work reality, which we had previously anticipated happening gradually over the next five years, and we find ourselves in a world where the priority of making employees productive is accelerating data security risks faster than we can even assess.

As organizations empower employees with new collaboration technology — from Gmail and Slack, to project management tools and code repository apps — the places where corporate data lives and moves are fundamentally changing.

And here’s the deal: security teams can’t address these risks alone. In my position helping a variety of organizations build effective security processes and programs, I have seen a few security teams quickly address data security vulnerabilities by simply engaging business partners — and not with the traditional security awareness programs. HR teams, legal and line of business leaders can play a critical role in data security in this era of collaboration and working from whatever location you’re productive.

We’ll summarize here the four common, yet critical, attributes of successful security organizations, regardless of their maturity:

To Continue Reading…

Share a few pieces of information and we’ll personalize your experience with us

1. They help their business stakeholders understand the situation

Today, the emphasis on employee productivity is essential, but so is addressing the risk that new tech and working patterns introduce. What do business stakeholders need to know right now?

Many traditional security tools rely on employees being connected to the corporate network. Increasingly, employees are working off-network – so security misses a lot of visibility into how data moves. Tools that deliver endpoint visibility via an agent or without requiring data to flow through a VPN are suddenly in-demand.

Also, when people are working from home, they tend to feel more comfortable and work as if they were using personal devices. Basic security hygiene should not lapse when employees work outside the office.

Exfiltration or misuse of corporate data doesn’t have to be malicious. In fact, it isn’t in most cases. Simple mistakes happen. And people use tools that help them get their jobs done efficiently. In fact, more than a third (37%) of employees told Code42 recently that they use unsanctioned apps every day to share data with their colleagues. It isn’t that security teams don’t trust employees or want to police the organization. Instead, they want to understand where vulnerabilities are so they can adapt existing protocols and ensure the right tools are in place to enable employee productivity.

Security teams know that collaboration tools aren’t going anywhere and that they’re essential for the modern workforce, so security is adapting and needs the help of business partners.

2. They get business stakeholders to understand the implications and urgency of data loss — by being transparent and realistic, but not sensational

Ok, we know the response you’ll get to the last bullet above is “You need my help? Take a number.” Up the priority by highlighting what data loss means for them (but don’t be over the top).

Frame the situation in a useful way for your audience:

  • Head of engineering? Talk about the possibility of losing source code, sabotage, or negligent sharing. Losing the confidentiality of that data means you won’t be first to market with your solution.
  • Head of legal? It’s not all about compliance. What security is trying to do is get ahead of the inevitable investigation and protect data from loss or misuse early, so that costly litigation is less necessary.
  • Head of HR? Look, security’s not the morality police, and this new world isn’t changing that. So, be clear that security wants to follow the data, not the people. Make a plan early to get HR the data security info they need to protect the integrity of your company’s culture without requiring that security teams invasively surveil users, or that HR teams become experts using complicated security tools to pair data activity to users.
    • Quick win: here’s an eBook you can send your HR leader on the security costs of employee turnover.

3. They make a plan early to address data security at scale during periods of change.

Employees are still going to resign. People are going to act carelessly with data. Organizations are going to restructure. Get your stakeholders involved in making a plan and be sure not to let the intimidation of a big program get in the way.

  • Start with quick wins, not a full-blown program. Plan for data security and visibility into where data lives and moves during off-boarding; ask about and see the riskiest behaviors with shadow IT and mirror technology, and prepare for endpoint visibility in remote work.
  • Look for context — ask your line of business partners what’s normal and strange. Without context, tracking data is all just file events. Is it normal for your sales reps to use file-sharing tools their clients dictate? Which ones? Which marketing folks should or should not have Salesforce reports on their computers? 
  • Code42 helps organizations address data security using tools like ours to improve the speed and accuracy of insider threat detection, investigation and response. Code42 Incydr™ delivers the risk signal needed to distinguish between everyday collaboration and the events that actually put company data at risk.

4. Be transparent with your line of business leaders. It encourages better behavior.

  • You don’t have to share the details or the keys to the kingdom, but remind people of acceptable use protocols and let them know that you’re monitoring data use.
  • The response to insider threats to data isn’t the same as a traditional IR or SOC response. And in most cases of mishandling data, the response won’t require punitive action. While you’ll certainly want to be prepared for how you and your business partners will handle malicious theft of data, the most common response will be some education and security awareness – not only with employees, but with business leaders to help them understand the inadvertent risk a company can incur when teams misuse or exfiltrate data.
  • It’s easier to be transparent when you’re monitoring data use instead of employees themselves.

Organizations are rapidly responding to their environments and pushing for digital-first strategies. It’s time to embrace the collaboration culture by empowering security organizations to create a strategy that enables that culture.

Mason Swenson

With more than 15 years of experience in industry-leading technology, senior manager of product management Mason Swenson brings a unique ability to identify market and industry trends and forecast impacts on technology managers and buyers. Prior to Code42, Mason worked with Imation as a regional sales manager and product manager and with Seagate Technology in product management and finance.

Code42 logo
Code42 logo

Code42

  • About Code42
  • News + Events
  • Awards
  • Investors
  • Leadership
  • Careers
  • Contact Sales

Learn More

  • Insider Risk Ecosystem
  • Reseller Partners
  • Federal Solutions
  • Higher Education Solutions
  • CrashPlan for Small Business
  • Customer Stories

Support

  • Help Center
  • Code42 University
  • Professional Services
  • Twitter Twitter
  • Facebook Facebook
  • LinkedIn LinkedIn
  • YouTube YouTube
  • Terms of Use
  • Privacy Statement
  • Impressum
© 2021 Code42 Software, Inc. All rights reserved.
Get Started with Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Start Free Trialright arrow icon
Try Incydr at no cost for 30 days to quickly uncover your data blindspots
Interactive Demo
Take Incydr for a spin in our free sandbox environment.
Launch the demo right arrow icon
Explore the deeper functionality of Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Interactive Demo
Take Incydr for a spin in our free sandbox environment.
Launch the demo right arrow icon

This website uses cookies to improve your user experience and to provide content tailored specifically to your interests. Detailed information on the use of cookies on this website, and how you can manage your preferences, is provided in our Cookie Notice. By clicking I Agree or continuing to use this website, you consent to the use of cookies. Learn more.

Code42
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.