Distributed teams with remote workers, mobile employees, and multiple office locations are faced with unique security challenges. The larger variety of devices, network infrastructure, and probable working locations all contribute to a wider attack surface that needs to be managed accordingly.
Employees need to have access to data in order to perform their roles and enable remote collaboration with their team members. Without a designated office space and equipment, ensuring secure remote access to sensitive data becomes a top priority for security professionals.
While technologies such as enterprise VPNs and remote access software can provide employees with secure access to the files they need, they can’t be relied upon as the sole source of data security. Even with an encrypted VPN connection a compromised endpoint device can potentially become an access point for threat actors to infiltrate the network. A layered security approach is needed to provide employees with remote access to data while mitigating the risks associated with their devices.
Even with secure remote access options, employees may negligently capture data and transfer it to unsecured channels if the speed of the remote access technology isn’t up to par. Network administrators can disable file transfers and copy/paste operations in an attempt to mitigate this risk, but employees can still potentially be capturing data through desktop recording software and by taking screenshots.
If remote access to data is required, the security infrastructure needs to include methods for validating the credentials of users that are connecting to the internal network and methods of limiting access permissions based on the employee’s risk level and the requirements of their role.
The prevalence of mobile devices and wider variety of working locations introduce significant physical security risks for distributed teams. Whether employees are working from home, out of a shared co-working space, or while travelling, they are likely to not have the same degree of physical security measures as employees in a traditional office.
The prevalent use of personal devices among distributed teams comes with a high degree of risks. While some of these risks may be addressed by measures outlined in a formal Bring Your Own Device (BYOD) policy, IT security teams simply cannot ensure the same level of protection for personal devices as they can for company-provided devices.
Employees that work from home and connect to the internet using their home networks are also more vulnerable to external threats. Remote employees may not be proactively securing their networking hardware against common exploits such as default remote access credentials that allow threat actors to enact Man-in-the-Middle (MITM) attacks.
Employees that are using personal devices have unfettered access to admin privileges – this poses a significant opportunity for unmanaged software and hardware to become an endpoint security vulnerability. The endpoint devices of distributed employees can also be connected to notoriously insecure consumer IoT devices, devices of other household members, and several other internet-capable devices that are unable to be managed by the corporate IT department.
While company-provided devices can be readily monitored and managed, they are not immune to shadow IT vulnerabilities. Even without admin access, end-users can retain access to several shadow IT programs through the use of web portals that offer similar functionality. While the use of a web filter can block access to these programs, distributed teams will also need to place a significant emphasis on developing a knowledgeable and security-driven workforce to further mitigate shadow IT risks.
Employees that are working from home are likely to inadvertently increase their security risks by letting their defenses down. Security teams and leadership need to work with distributed employees to ensure that security is prioritized as a company-wide responsibility and not simply a task for the IT department to manage.
Maintaining a security culture is much easier when employees are in constant contact with their coworkers and other members of the company. Employees in a distributed team need to be provided with consistent messaging that focuses on their data security responsibilities, the actions they can take to maintain the security of their devices, and the common threats that they can expect to be faced with.
Get started today—Download the FREE template and customize it to fit the needs of your organization.
The employee offboarding process presents significant data security risks. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected.
These vulnerabilities need to be addressed as part of any insider threat management program. Click the button below to learn the best practices for protecting data during a termination and gain access to a downloadable IT offboarding checklist.
The unique security challenges of distributed teams largely stem from the difficulty of implementing and enforcing the critical security controls that take place in traditional office environments. These challenges can be addressed with careful consideration for how remote-compatible technologies and procedures can be used for authentication, secure file access, and enforcing cybersecurity best practices. Where the provision of carefully monitored and managed devices is not feasible, security teams will need to work within the limitations of personal devices and address the added risks.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |