Covid-19 recovery: A CIO’s playbook

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for the next 6 months and beyond.

coronavirus remote worker work from home romolotavani getty
RomoloTavani / Getty Images / Thinkstock

“How should we adapt our cybersecurity controls to address the new WFH reality?" This question is top-of-mind for CIOs and security executives. When it comes to cybersecurity in the post-COVID era, every CIO needs an answer to three key questions:

  1. What are the changes in usage patterns and architecture in my IT environment?
  2. How do these changes affect risk?
  3. What changes do I need to make to my cybersecurity posture and control environment?

Changes in usage patterns and architecture

For many organizations, working from home (WFH) was uncommon, especially for traditional office workers in horizontal business functions like finance, human resources, marketing, and so on. In addition, they are used to going to someone's desk when they need something. This affects usage in two ways: remote access is now critical for many employees, and communication and collaboration solutions are essential for many employees' effectiveness at work.

Of particular importance are the most sensitive applications that often run on-premises on separate networks. This poses a problem not only for protection needs, but also for compliance with global and industry regulations. ?

To continue reading this article register now

7 secrets of successful remote IT teams
??